Dec 13 02:04:03.122402 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Dec 12 23:50:37 -00 2024 Dec 13 02:04:03.122445 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:04:03.122462 kernel: BIOS-provided physical RAM map: Dec 13 02:04:03.122475 kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] reserved Dec 13 02:04:03.122486 kernel: BIOS-e820: [mem 0x0000000000001000-0x0000000000054fff] usable Dec 13 02:04:03.122499 kernel: BIOS-e820: [mem 0x0000000000055000-0x000000000005ffff] reserved Dec 13 02:04:03.122517 kernel: BIOS-e820: [mem 0x0000000000060000-0x0000000000097fff] usable Dec 13 02:04:03.122531 kernel: BIOS-e820: [mem 0x0000000000098000-0x000000000009ffff] reserved Dec 13 02:04:03.122544 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bd276fff] usable Dec 13 02:04:03.122557 kernel: BIOS-e820: [mem 0x00000000bd277000-0x00000000bd280fff] ACPI data Dec 13 02:04:03.122570 kernel: BIOS-e820: [mem 0x00000000bd281000-0x00000000bf8ecfff] usable Dec 13 02:04:03.122584 kernel: BIOS-e820: [mem 0x00000000bf8ed000-0x00000000bfb6cfff] reserved Dec 13 02:04:03.122596 kernel: BIOS-e820: [mem 0x00000000bfb6d000-0x00000000bfb7efff] ACPI data Dec 13 02:04:03.122610 kernel: BIOS-e820: [mem 0x00000000bfb7f000-0x00000000bfbfefff] ACPI NVS Dec 13 02:04:03.122630 kernel: BIOS-e820: [mem 0x00000000bfbff000-0x00000000bffdffff] usable Dec 13 02:04:03.122644 kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved Dec 13 02:04:03.122658 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable Dec 13 02:04:03.122673 kernel: NX (Execute Disable) protection: active Dec 13 02:04:03.122687 kernel: efi: EFI v2.70 by EDK II Dec 13 02:04:03.122702 kernel: efi: TPMFinalLog=0xbfbf7000 ACPI=0xbfb7e000 ACPI 2.0=0xbfb7e014 SMBIOS=0xbf9e8000 RNG=0xbfb73018 TPMEventLog=0xbd277018 Dec 13 02:04:03.122716 kernel: random: crng init done Dec 13 02:04:03.122731 kernel: SMBIOS 2.4 present. Dec 13 02:04:03.122749 kernel: DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Dec 13 02:04:03.122763 kernel: Hypervisor detected: KVM Dec 13 02:04:03.122778 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 02:04:03.122793 kernel: kvm-clock: cpu 0, msr 2619b001, primary cpu clock Dec 13 02:04:03.122808 kernel: kvm-clock: using sched offset of 13217228956 cycles Dec 13 02:04:03.122823 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 02:04:03.122838 kernel: tsc: Detected 2299.998 MHz processor Dec 13 02:04:03.122853 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 02:04:03.122869 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 02:04:03.122884 kernel: last_pfn = 0x220000 max_arch_pfn = 0x400000000 Dec 13 02:04:03.122903 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 02:04:03.122917 kernel: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 Dec 13 02:04:03.122931 kernel: Using GB pages for direct mapping Dec 13 02:04:03.122946 kernel: Secure boot disabled Dec 13 02:04:03.122960 kernel: ACPI: Early table checksum verification disabled Dec 13 02:04:03.122975 kernel: ACPI: RSDP 0x00000000BFB7E014 000024 (v02 Google) Dec 13 02:04:03.122990 kernel: ACPI: XSDT 0x00000000BFB7D0E8 00005C (v01 Google GOOGFACP 00000001 01000013) Dec 13 02:04:03.123006 kernel: ACPI: FACP 0x00000000BFB78000 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) Dec 13 02:04:03.123031 kernel: ACPI: DSDT 0x00000000BFB79000 001A64 (v01 Google GOOGDSDT 00000001 GOOG 00000001) Dec 13 02:04:03.123047 kernel: ACPI: FACS 0x00000000BFBF2000 000040 Dec 13 02:04:03.123064 kernel: ACPI: SSDT 0x00000000BFB7C000 000316 (v02 GOOGLE Tpm2Tabl 00001000 INTL 20240322) Dec 13 02:04:03.123081 kernel: ACPI: TPM2 0x00000000BFB7B000 000034 (v04 GOOGLE 00000001 GOOG 00000001) Dec 13 02:04:03.123097 kernel: ACPI: SRAT 0x00000000BFB77000 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) Dec 13 02:04:03.127595 kernel: ACPI: APIC 0x00000000BFB76000 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) Dec 13 02:04:03.127627 kernel: ACPI: SSDT 0x00000000BFB75000 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) Dec 13 02:04:03.127644 kernel: ACPI: WAET 0x00000000BFB74000 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) Dec 13 02:04:03.127660 kernel: ACPI: Reserving FACP table memory at [mem 0xbfb78000-0xbfb780f3] Dec 13 02:04:03.127675 kernel: ACPI: Reserving DSDT table memory at [mem 0xbfb79000-0xbfb7aa63] Dec 13 02:04:03.127692 kernel: ACPI: Reserving FACS table memory at [mem 0xbfbf2000-0xbfbf203f] Dec 13 02:04:03.127709 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb7c000-0xbfb7c315] Dec 13 02:04:03.127725 kernel: ACPI: Reserving TPM2 table memory at [mem 0xbfb7b000-0xbfb7b033] Dec 13 02:04:03.127741 kernel: ACPI: Reserving SRAT table memory at [mem 0xbfb77000-0xbfb770c7] Dec 13 02:04:03.127757 kernel: ACPI: Reserving APIC table memory at [mem 0xbfb76000-0xbfb76075] Dec 13 02:04:03.127776 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb75000-0xbfb7597f] Dec 13 02:04:03.127792 kernel: ACPI: Reserving WAET table memory at [mem 0xbfb74000-0xbfb74027] Dec 13 02:04:03.127807 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 02:04:03.127823 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Dec 13 02:04:03.127839 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Dec 13 02:04:03.127854 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] Dec 13 02:04:03.127870 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] Dec 13 02:04:03.127886 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] Dec 13 02:04:03.127901 kernel: NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] Dec 13 02:04:03.127920 kernel: NODE_DATA(0) allocated [mem 0x21fff8000-0x21fffdfff] Dec 13 02:04:03.127936 kernel: Zone ranges: Dec 13 02:04:03.127952 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 02:04:03.127968 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Dec 13 02:04:03.127984 kernel: Normal [mem 0x0000000100000000-0x000000021fffffff] Dec 13 02:04:03.127999 kernel: Movable zone start for each node Dec 13 02:04:03.128015 kernel: Early memory node ranges Dec 13 02:04:03.128030 kernel: node 0: [mem 0x0000000000001000-0x0000000000054fff] Dec 13 02:04:03.128046 kernel: node 0: [mem 0x0000000000060000-0x0000000000097fff] Dec 13 02:04:03.128065 kernel: node 0: [mem 0x0000000000100000-0x00000000bd276fff] Dec 13 02:04:03.128081 kernel: node 0: [mem 0x00000000bd281000-0x00000000bf8ecfff] Dec 13 02:04:03.128097 kernel: node 0: [mem 0x00000000bfbff000-0x00000000bffdffff] Dec 13 02:04:03.128139 kernel: node 0: [mem 0x0000000100000000-0x000000021fffffff] Dec 13 02:04:03.128155 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] Dec 13 02:04:03.128171 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 02:04:03.128186 kernel: On node 0, zone DMA: 11 pages in unavailable ranges Dec 13 02:04:03.128202 kernel: On node 0, zone DMA: 104 pages in unavailable ranges Dec 13 02:04:03.128218 kernel: On node 0, zone DMA32: 10 pages in unavailable ranges Dec 13 02:04:03.128238 kernel: On node 0, zone DMA32: 786 pages in unavailable ranges Dec 13 02:04:03.128254 kernel: On node 0, zone Normal: 32 pages in unavailable ranges Dec 13 02:04:03.128271 kernel: ACPI: PM-Timer IO Port: 0xb008 Dec 13 02:04:03.128287 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 02:04:03.128303 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 13 02:04:03.128319 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 02:04:03.128336 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 02:04:03.128351 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 02:04:03.128368 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 02:04:03.128387 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 02:04:03.128404 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Dec 13 02:04:03.128420 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Dec 13 02:04:03.128435 kernel: Booting paravirtualized kernel on KVM Dec 13 02:04:03.128452 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 02:04:03.128468 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Dec 13 02:04:03.128484 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Dec 13 02:04:03.128500 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Dec 13 02:04:03.128516 kernel: pcpu-alloc: [0] 0 1 Dec 13 02:04:03.128536 kernel: kvm-guest: PV spinlocks enabled Dec 13 02:04:03.128552 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 02:04:03.128568 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1932270 Dec 13 02:04:03.128584 kernel: Policy zone: Normal Dec 13 02:04:03.128603 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:04:03.128619 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 02:04:03.128636 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Dec 13 02:04:03.128651 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 02:04:03.128664 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 02:04:03.128684 kernel: Memory: 7515400K/7860544K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47476K init, 4108K bss, 344884K reserved, 0K cma-reserved) Dec 13 02:04:03.128699 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 02:04:03.128714 kernel: Kernel/User page tables isolation: enabled Dec 13 02:04:03.128729 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 02:04:03.128746 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 02:04:03.128760 kernel: rcu: Hierarchical RCU implementation. Dec 13 02:04:03.128776 kernel: rcu: RCU event tracing is enabled. Dec 13 02:04:03.128790 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 02:04:03.128811 kernel: Rude variant of Tasks RCU enabled. Dec 13 02:04:03.128839 kernel: Tracing variant of Tasks RCU enabled. Dec 13 02:04:03.128857 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 02:04:03.128876 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 02:04:03.128892 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Dec 13 02:04:03.128908 kernel: Console: colour dummy device 80x25 Dec 13 02:04:03.128925 kernel: printk: console [ttyS0] enabled Dec 13 02:04:03.128940 kernel: ACPI: Core revision 20210730 Dec 13 02:04:03.128957 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 02:04:03.128974 kernel: x2apic enabled Dec 13 02:04:03.128993 kernel: Switched APIC routing to physical x2apic. Dec 13 02:04:03.129010 kernel: ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 Dec 13 02:04:03.129026 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Dec 13 02:04:03.129042 kernel: Calibrating delay loop (skipped) preset value.. 4599.99 BogoMIPS (lpj=2299998) Dec 13 02:04:03.129058 kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 Dec 13 02:04:03.129074 kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 Dec 13 02:04:03.129091 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 02:04:03.129145 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Dec 13 02:04:03.129162 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Dec 13 02:04:03.129179 kernel: Spectre V2 : Mitigation: IBRS Dec 13 02:04:03.129195 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 02:04:03.129212 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 02:04:03.129228 kernel: RETBleed: Mitigation: IBRS Dec 13 02:04:03.129245 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 02:04:03.129262 kernel: Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl Dec 13 02:04:03.129279 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 02:04:03.129299 kernel: MDS: Mitigation: Clear CPU buffers Dec 13 02:04:03.129316 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 02:04:03.129332 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 02:04:03.129349 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 02:04:03.129365 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 02:04:03.129381 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 02:04:03.129399 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Dec 13 02:04:03.129417 kernel: Freeing SMP alternatives memory: 32K Dec 13 02:04:03.129434 kernel: pid_max: default: 32768 minimum: 301 Dec 13 02:04:03.129453 kernel: LSM: Security Framework initializing Dec 13 02:04:03.129469 kernel: SELinux: Initializing. Dec 13 02:04:03.129485 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 02:04:03.129501 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 02:04:03.129516 kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) Dec 13 02:04:03.129532 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Dec 13 02:04:03.129549 kernel: signal: max sigframe size: 1776 Dec 13 02:04:03.129565 kernel: rcu: Hierarchical SRCU implementation. Dec 13 02:04:03.129582 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 02:04:03.129604 kernel: smp: Bringing up secondary CPUs ... Dec 13 02:04:03.129620 kernel: x86: Booting SMP configuration: Dec 13 02:04:03.129637 kernel: .... node #0, CPUs: #1 Dec 13 02:04:03.129652 kernel: kvm-clock: cpu 1, msr 2619b041, secondary cpu clock Dec 13 02:04:03.129669 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Dec 13 02:04:03.129688 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Dec 13 02:04:03.129706 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 02:04:03.129723 kernel: smpboot: Max logical packages: 1 Dec 13 02:04:03.129745 kernel: smpboot: Total of 2 processors activated (9199.99 BogoMIPS) Dec 13 02:04:03.129763 kernel: devtmpfs: initialized Dec 13 02:04:03.129781 kernel: x86/mm: Memory block size: 128MB Dec 13 02:04:03.129800 kernel: ACPI: PM: Registering ACPI NVS region [mem 0xbfb7f000-0xbfbfefff] (524288 bytes) Dec 13 02:04:03.129818 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 02:04:03.129836 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 02:04:03.129854 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 02:04:03.129872 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 02:04:03.129887 kernel: audit: initializing netlink subsys (disabled) Dec 13 02:04:03.129906 kernel: audit: type=2000 audit(1734055441.897:1): state=initialized audit_enabled=0 res=1 Dec 13 02:04:03.129921 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 02:04:03.129935 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 02:04:03.129951 kernel: cpuidle: using governor menu Dec 13 02:04:03.129967 kernel: ACPI: bus type PCI registered Dec 13 02:04:03.129984 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 02:04:03.130001 kernel: dca service started, version 1.12.1 Dec 13 02:04:03.130018 kernel: PCI: Using configuration type 1 for base access Dec 13 02:04:03.130035 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 02:04:03.130056 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 02:04:03.130073 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 02:04:03.130091 kernel: ACPI: Added _OSI(Module Device) Dec 13 02:04:03.130379 kernel: ACPI: Added _OSI(Processor Device) Dec 13 02:04:03.130403 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 02:04:03.130421 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 02:04:03.130439 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 02:04:03.130585 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 02:04:03.130606 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 02:04:03.130629 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Dec 13 02:04:03.130647 kernel: ACPI: Interpreter enabled Dec 13 02:04:03.130665 kernel: ACPI: PM: (supports S0 S3 S5) Dec 13 02:04:03.130682 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 02:04:03.130826 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 02:04:03.130845 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Dec 13 02:04:03.130862 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 02:04:03.131375 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Dec 13 02:04:03.131554 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Dec 13 02:04:03.131578 kernel: PCI host bridge to bus 0000:00 Dec 13 02:04:03.131733 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 02:04:03.131874 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 02:04:03.132019 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 02:04:03.132191 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] Dec 13 02:04:03.132336 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 02:04:03.132514 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Dec 13 02:04:03.132682 kernel: pci 0000:00:01.0: [8086:7110] type 00 class 0x060100 Dec 13 02:04:03.132848 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Dec 13 02:04:03.133004 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Dec 13 02:04:03.133201 kernel: pci 0000:00:03.0: [1af4:1004] type 00 class 0x000000 Dec 13 02:04:03.133370 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] Dec 13 02:04:03.133545 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc0001000-0xc000107f] Dec 13 02:04:03.133734 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Dec 13 02:04:03.133902 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] Dec 13 02:04:03.134076 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc0000000-0xc000007f] Dec 13 02:04:03.139654 kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 Dec 13 02:04:03.140077 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Dec 13 02:04:03.140307 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc0002000-0xc000203f] Dec 13 02:04:03.140340 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 02:04:03.140359 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 02:04:03.140377 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 02:04:03.140394 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 02:04:03.140412 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Dec 13 02:04:03.140430 kernel: iommu: Default domain type: Translated Dec 13 02:04:03.140448 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 02:04:03.140466 kernel: vgaarb: loaded Dec 13 02:04:03.140484 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 02:04:03.140506 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 02:04:03.140523 kernel: PTP clock support registered Dec 13 02:04:03.140542 kernel: Registered efivars operations Dec 13 02:04:03.140559 kernel: PCI: Using ACPI for IRQ routing Dec 13 02:04:03.140577 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 02:04:03.140594 kernel: e820: reserve RAM buffer [mem 0x00055000-0x0005ffff] Dec 13 02:04:03.140612 kernel: e820: reserve RAM buffer [mem 0x00098000-0x0009ffff] Dec 13 02:04:03.140629 kernel: e820: reserve RAM buffer [mem 0xbd277000-0xbfffffff] Dec 13 02:04:03.140646 kernel: e820: reserve RAM buffer [mem 0xbf8ed000-0xbfffffff] Dec 13 02:04:03.140666 kernel: e820: reserve RAM buffer [mem 0xbffe0000-0xbfffffff] Dec 13 02:04:03.140683 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 02:04:03.140701 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 02:04:03.140719 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 02:04:03.140737 kernel: pnp: PnP ACPI init Dec 13 02:04:03.140755 kernel: pnp: PnP ACPI: found 7 devices Dec 13 02:04:03.140773 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 02:04:03.140791 kernel: NET: Registered PF_INET protocol family Dec 13 02:04:03.140808 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 02:04:03.140829 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Dec 13 02:04:03.140846 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 02:04:03.140864 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 02:04:03.140882 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Dec 13 02:04:03.140900 kernel: TCP: Hash tables configured (established 65536 bind 65536) Dec 13 02:04:03.140918 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 13 02:04:03.140936 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 13 02:04:03.140954 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 02:04:03.140971 kernel: NET: Registered PF_XDP protocol family Dec 13 02:04:03.141198 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 02:04:03.141353 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 02:04:03.141498 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 02:04:03.141676 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfefff window] Dec 13 02:04:03.141854 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Dec 13 02:04:03.141877 kernel: PCI: CLS 0 bytes, default 64 Dec 13 02:04:03.141895 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Dec 13 02:04:03.141918 kernel: software IO TLB: mapped [mem 0x00000000b7f7f000-0x00000000bbf7f000] (64MB) Dec 13 02:04:03.141936 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 02:04:03.141954 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Dec 13 02:04:03.141971 kernel: clocksource: Switched to clocksource tsc Dec 13 02:04:03.141988 kernel: Initialise system trusted keyrings Dec 13 02:04:03.142004 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Dec 13 02:04:03.142021 kernel: Key type asymmetric registered Dec 13 02:04:03.142045 kernel: Asymmetric key parser 'x509' registered Dec 13 02:04:03.142062 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 02:04:03.142083 kernel: io scheduler mq-deadline registered Dec 13 02:04:03.142115 kernel: io scheduler kyber registered Dec 13 02:04:03.142140 kernel: io scheduler bfq registered Dec 13 02:04:03.142157 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 02:04:03.142176 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Dec 13 02:04:03.142344 kernel: virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver Dec 13 02:04:03.142366 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Dec 13 02:04:03.142527 kernel: virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver Dec 13 02:04:03.142549 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Dec 13 02:04:03.142707 kernel: virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver Dec 13 02:04:03.142729 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 02:04:03.142746 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 02:04:03.142763 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Dec 13 02:04:03.142781 kernel: 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A Dec 13 02:04:03.142798 kernel: 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A Dec 13 02:04:03.142958 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x9009, rev-id 0) Dec 13 02:04:03.142981 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 02:04:03.143002 kernel: i8042: Warning: Keylock active Dec 13 02:04:03.143019 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 02:04:03.143036 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 02:04:03.162327 kernel: rtc_cmos 00:00: RTC can wake from S4 Dec 13 02:04:03.162512 kernel: rtc_cmos 00:00: registered as rtc0 Dec 13 02:04:03.162667 kernel: rtc_cmos 00:00: setting system clock to 2024-12-13T02:04:02 UTC (1734055442) Dec 13 02:04:03.162816 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Dec 13 02:04:03.162840 kernel: intel_pstate: CPU model not supported Dec 13 02:04:03.162865 kernel: pstore: Registered efi as persistent store backend Dec 13 02:04:03.162883 kernel: NET: Registered PF_INET6 protocol family Dec 13 02:04:03.162901 kernel: Segment Routing with IPv6 Dec 13 02:04:03.162918 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 02:04:03.162935 kernel: NET: Registered PF_PACKET protocol family Dec 13 02:04:03.162952 kernel: Key type dns_resolver registered Dec 13 02:04:03.162969 kernel: IPI shorthand broadcast: enabled Dec 13 02:04:03.162987 kernel: sched_clock: Marking stable (698850794, 139658565)->(857943844, -19434485) Dec 13 02:04:03.163004 kernel: registered taskstats version 1 Dec 13 02:04:03.163025 kernel: Loading compiled-in X.509 certificates Dec 13 02:04:03.163043 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 02:04:03.163060 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: d9defb0205602bee9bb670636cbe5c74194fdb5e' Dec 13 02:04:03.163077 kernel: Key type .fscrypt registered Dec 13 02:04:03.163094 kernel: Key type fscrypt-provisioning registered Dec 13 02:04:03.165148 kernel: pstore: Using crash dump compression: deflate Dec 13 02:04:03.165174 kernel: ima: Allocated hash algorithm: sha1 Dec 13 02:04:03.165201 kernel: ima: No architecture policies found Dec 13 02:04:03.165225 kernel: clk: Disabling unused clocks Dec 13 02:04:03.165242 kernel: Freeing unused kernel image (initmem) memory: 47476K Dec 13 02:04:03.165258 kernel: Write protecting the kernel read-only data: 28672k Dec 13 02:04:03.165275 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 02:04:03.165292 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 02:04:03.165309 kernel: Run /init as init process Dec 13 02:04:03.165325 kernel: with arguments: Dec 13 02:04:03.165342 kernel: /init Dec 13 02:04:03.165358 kernel: with environment: Dec 13 02:04:03.165373 kernel: HOME=/ Dec 13 02:04:03.165395 kernel: TERM=linux Dec 13 02:04:03.165413 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 02:04:03.165436 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 02:04:03.165456 systemd[1]: Detected virtualization kvm. Dec 13 02:04:03.165474 systemd[1]: Detected architecture x86-64. Dec 13 02:04:03.165490 systemd[1]: Running in initrd. Dec 13 02:04:03.165506 systemd[1]: No hostname configured, using default hostname. Dec 13 02:04:03.165529 systemd[1]: Hostname set to . Dec 13 02:04:03.165549 systemd[1]: Initializing machine ID from VM UUID. Dec 13 02:04:03.165568 systemd[1]: Queued start job for default target initrd.target. Dec 13 02:04:03.165586 systemd[1]: Started systemd-ask-password-console.path. Dec 13 02:04:03.165604 systemd[1]: Reached target cryptsetup.target. Dec 13 02:04:03.165623 systemd[1]: Reached target paths.target. Dec 13 02:04:03.165639 systemd[1]: Reached target slices.target. Dec 13 02:04:03.165658 systemd[1]: Reached target swap.target. Dec 13 02:04:03.165681 systemd[1]: Reached target timers.target. Dec 13 02:04:03.165700 systemd[1]: Listening on iscsid.socket. Dec 13 02:04:03.165718 systemd[1]: Listening on iscsiuio.socket. Dec 13 02:04:03.165736 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 02:04:03.165754 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 02:04:03.165772 systemd[1]: Listening on systemd-journald.socket. Dec 13 02:04:03.165792 systemd[1]: Listening on systemd-networkd.socket. Dec 13 02:04:03.165810 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 02:04:03.165833 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 02:04:03.165872 systemd[1]: Reached target sockets.target. Dec 13 02:04:03.165895 systemd[1]: Starting kmod-static-nodes.service... Dec 13 02:04:03.165915 systemd[1]: Finished network-cleanup.service. Dec 13 02:04:03.165935 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 02:04:03.165955 systemd[1]: Starting systemd-journald.service... Dec 13 02:04:03.165977 systemd[1]: Starting systemd-modules-load.service... Dec 13 02:04:03.165997 systemd[1]: Starting systemd-resolved.service... Dec 13 02:04:03.166016 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 02:04:03.166036 systemd[1]: Finished kmod-static-nodes.service. Dec 13 02:04:03.166056 kernel: audit: type=1130 audit(1734055443.122:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:03.166077 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 02:04:03.166095 kernel: audit: type=1130 audit(1734055443.133:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:03.166144 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 02:04:03.166163 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 02:04:03.166193 kernel: audit: type=1130 audit(1734055443.142:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:03.166213 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 02:04:03.166241 systemd-journald[189]: Journal started Dec 13 02:04:03.166343 systemd-journald[189]: Runtime Journal (/run/log/journal/f1727a7d078cd9982a81f19686a7ecbc) is 8.0M, max 148.8M, 140.8M free. Dec 13 02:04:03.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:03.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:03.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:03.151525 systemd-modules-load[190]: Inserted module 'overlay' Dec 13 02:04:03.174227 systemd[1]: Started systemd-journald.service. Dec 13 02:04:03.174287 kernel: audit: type=1130 audit(1734055443.168:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:03.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:03.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:03.175609 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 02:04:03.180440 kernel: audit: type=1130 audit(1734055443.174:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:03.211206 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 02:04:03.224442 kernel: audit: type=1130 audit(1734055443.214:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:03.214000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:03.214297 systemd-resolved[191]: Positive Trust Anchors: Dec 13 02:04:03.214316 systemd-resolved[191]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 02:04:03.214381 systemd-resolved[191]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 02:04:03.216739 systemd[1]: Starting dracut-cmdline.service... Dec 13 02:04:03.248251 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 02:04:03.248292 dracut-cmdline[206]: dracut-dracut-053 Dec 13 02:04:03.227578 systemd-resolved[191]: Defaulting to hostname 'linux'. Dec 13 02:04:03.256252 kernel: Bridge firewalling registered Dec 13 02:04:03.256289 dracut-cmdline[206]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:04:03.230476 systemd[1]: Started systemd-resolved.service. Dec 13 02:04:03.254768 systemd-modules-load[190]: Inserted module 'br_netfilter' Dec 13 02:04:03.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:03.277523 systemd[1]: Reached target nss-lookup.target. Dec 13 02:04:03.287239 kernel: audit: type=1130 audit(1734055443.276:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:03.295127 kernel: SCSI subsystem initialized Dec 13 02:04:03.313923 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 02:04:03.313999 kernel: device-mapper: uevent: version 1.0.3 Dec 13 02:04:03.317131 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 02:04:03.320885 systemd-modules-load[190]: Inserted module 'dm_multipath' Dec 13 02:04:03.322039 systemd[1]: Finished systemd-modules-load.service. Dec 13 02:04:03.339267 kernel: audit: type=1130 audit(1734055443.328:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:03.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:03.330491 systemd[1]: Starting systemd-sysctl.service... Dec 13 02:04:03.346170 systemd[1]: Finished systemd-sysctl.service. Dec 13 02:04:03.357259 kernel: audit: type=1130 audit(1734055443.349:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:03.357299 kernel: Loading iSCSI transport class v2.0-870. Dec 13 02:04:03.349000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:03.378149 kernel: iscsi: registered transport (tcp) Dec 13 02:04:03.405148 kernel: iscsi: registered transport (qla4xxx) Dec 13 02:04:03.405236 kernel: QLogic iSCSI HBA Driver Dec 13 02:04:03.451795 systemd[1]: Finished dracut-cmdline.service. Dec 13 02:04:03.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:03.453974 systemd[1]: Starting dracut-pre-udev.service... Dec 13 02:04:03.511181 kernel: raid6: avx2x4 gen() 17894 MB/s Dec 13 02:04:03.528147 kernel: raid6: avx2x4 xor() 8029 MB/s Dec 13 02:04:03.545152 kernel: raid6: avx2x2 gen() 18263 MB/s Dec 13 02:04:03.562146 kernel: raid6: avx2x2 xor() 18597 MB/s Dec 13 02:04:03.579149 kernel: raid6: avx2x1 gen() 14055 MB/s Dec 13 02:04:03.596149 kernel: raid6: avx2x1 xor() 16148 MB/s Dec 13 02:04:03.613148 kernel: raid6: sse2x4 gen() 11062 MB/s Dec 13 02:04:03.630144 kernel: raid6: sse2x4 xor() 6658 MB/s Dec 13 02:04:03.647151 kernel: raid6: sse2x2 gen() 12092 MB/s Dec 13 02:04:03.664147 kernel: raid6: sse2x2 xor() 7437 MB/s Dec 13 02:04:03.681148 kernel: raid6: sse2x1 gen() 10523 MB/s Dec 13 02:04:03.698658 kernel: raid6: sse2x1 xor() 5169 MB/s Dec 13 02:04:03.698702 kernel: raid6: using algorithm avx2x2 gen() 18263 MB/s Dec 13 02:04:03.698725 kernel: raid6: .... xor() 18597 MB/s, rmw enabled Dec 13 02:04:03.699487 kernel: raid6: using avx2x2 recovery algorithm Dec 13 02:04:03.715155 kernel: xor: automatically using best checksumming function avx Dec 13 02:04:03.823145 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 02:04:03.835280 systemd[1]: Finished dracut-pre-udev.service. Dec 13 02:04:03.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:03.835000 audit: BPF prog-id=7 op=LOAD Dec 13 02:04:03.835000 audit: BPF prog-id=8 op=LOAD Dec 13 02:04:03.837785 systemd[1]: Starting systemd-udevd.service... Dec 13 02:04:03.855011 systemd-udevd[388]: Using default interface naming scheme 'v252'. Dec 13 02:04:03.862146 systemd[1]: Started systemd-udevd.service. Dec 13 02:04:03.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:03.881402 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 02:04:03.897334 dracut-pre-trigger[402]: rd.md=0: removing MD RAID activation Dec 13 02:04:03.936450 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 02:04:03.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:03.937676 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 02:04:04.003973 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 02:04:04.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:04.088149 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 02:04:04.097139 kernel: scsi host0: Virtio SCSI HBA Dec 13 02:04:04.148210 kernel: scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 Dec 13 02:04:04.189237 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 02:04:04.189346 kernel: AES CTR mode by8 optimization enabled Dec 13 02:04:04.254715 kernel: sd 0:0:1:0: [sda] 25165824 512-byte logical blocks: (12.9 GB/12.0 GiB) Dec 13 02:04:04.311299 kernel: sd 0:0:1:0: [sda] 4096-byte physical blocks Dec 13 02:04:04.311478 kernel: sd 0:0:1:0: [sda] Write Protect is off Dec 13 02:04:04.311617 kernel: sd 0:0:1:0: [sda] Mode Sense: 1f 00 00 08 Dec 13 02:04:04.311750 kernel: sd 0:0:1:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Dec 13 02:04:04.311883 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 02:04:04.311898 kernel: GPT:17805311 != 25165823 Dec 13 02:04:04.311922 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 02:04:04.311936 kernel: GPT:17805311 != 25165823 Dec 13 02:04:04.311949 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 02:04:04.311962 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 02:04:04.311976 kernel: sd 0:0:1:0: [sda] Attached SCSI disk Dec 13 02:04:04.363135 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by (udev-worker) (439) Dec 13 02:04:04.365704 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 02:04:04.380873 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 02:04:04.384447 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 02:04:04.410646 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 02:04:04.427587 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 02:04:04.446978 systemd[1]: Starting disk-uuid.service... Dec 13 02:04:04.460431 disk-uuid[514]: Primary Header is updated. Dec 13 02:04:04.460431 disk-uuid[514]: Secondary Entries is updated. Dec 13 02:04:04.460431 disk-uuid[514]: Secondary Header is updated. Dec 13 02:04:04.493285 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 02:04:04.504133 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 02:04:04.524149 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 02:04:05.524132 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 02:04:05.524599 disk-uuid[515]: The operation has completed successfully. Dec 13 02:04:05.599791 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 02:04:05.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:05.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:05.599941 systemd[1]: Finished disk-uuid.service. Dec 13 02:04:05.613519 systemd[1]: Starting verity-setup.service... Dec 13 02:04:05.648280 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 02:04:05.726689 systemd[1]: Found device dev-mapper-usr.device. Dec 13 02:04:05.728468 systemd[1]: Mounting sysusr-usr.mount... Dec 13 02:04:05.745626 systemd[1]: Finished verity-setup.service. Dec 13 02:04:05.759000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:05.832100 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 02:04:05.832006 systemd[1]: Mounted sysusr-usr.mount. Dec 13 02:04:05.840572 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 02:04:05.884879 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 02:04:05.884924 kernel: BTRFS info (device sda6): using free space tree Dec 13 02:04:05.884948 kernel: BTRFS info (device sda6): has skinny extents Dec 13 02:04:05.841596 systemd[1]: Starting ignition-setup.service... Dec 13 02:04:05.898250 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 02:04:05.856644 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 02:04:05.919626 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 02:04:05.928231 systemd[1]: Finished ignition-setup.service. Dec 13 02:04:05.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:05.929581 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 02:04:05.979508 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 02:04:05.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:05.979000 audit: BPF prog-id=9 op=LOAD Dec 13 02:04:05.981701 systemd[1]: Starting systemd-networkd.service... Dec 13 02:04:06.013980 systemd-networkd[689]: lo: Link UP Dec 13 02:04:06.013996 systemd-networkd[689]: lo: Gained carrier Dec 13 02:04:06.014785 systemd-networkd[689]: Enumeration completed Dec 13 02:04:06.015258 systemd-networkd[689]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 02:04:06.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:06.015434 systemd[1]: Started systemd-networkd.service. Dec 13 02:04:06.018478 systemd-networkd[689]: eth0: Link UP Dec 13 02:04:06.018486 systemd-networkd[689]: eth0: Gained carrier Dec 13 02:04:06.031298 systemd-networkd[689]: eth0: DHCPv4 address 10.128.0.6/32, gateway 10.128.0.1 acquired from 169.254.169.254 Dec 13 02:04:06.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:06.044463 systemd[1]: Reached target network.target. Dec 13 02:04:06.125433 iscsid[699]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 02:04:06.125433 iscsid[699]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Dec 13 02:04:06.125433 iscsid[699]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 02:04:06.125433 iscsid[699]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 02:04:06.125433 iscsid[699]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 02:04:06.125433 iscsid[699]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 02:04:06.125433 iscsid[699]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 02:04:06.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:06.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:06.064499 systemd[1]: Starting iscsiuio.service... Dec 13 02:04:06.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:06.234745 ignition[641]: Ignition 2.14.0 Dec 13 02:04:06.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:06.085437 systemd[1]: Started iscsiuio.service. Dec 13 02:04:06.234759 ignition[641]: Stage: fetch-offline Dec 13 02:04:06.099612 systemd[1]: Starting iscsid.service... Dec 13 02:04:06.234827 ignition[641]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:04:06.118466 systemd[1]: Started iscsid.service. Dec 13 02:04:06.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:06.234945 ignition[641]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 02:04:06.133662 systemd[1]: Starting dracut-initqueue.service... Dec 13 02:04:06.272879 ignition[641]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 02:04:06.171727 systemd[1]: Finished dracut-initqueue.service. Dec 13 02:04:06.273210 ignition[641]: parsed url from cmdline: "" Dec 13 02:04:06.204463 systemd[1]: Reached target remote-fs-pre.target. Dec 13 02:04:06.273216 ignition[641]: no config URL provided Dec 13 02:04:06.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:06.213286 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 02:04:06.273224 ignition[641]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 02:04:06.213417 systemd[1]: Reached target remote-fs.target. Dec 13 02:04:06.273236 ignition[641]: no config at "/usr/lib/ignition/user.ign" Dec 13 02:04:06.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:06.247579 systemd[1]: Starting dracut-pre-mount.service... Dec 13 02:04:06.273245 ignition[641]: failed to fetch config: resource requires networking Dec 13 02:04:06.266898 systemd[1]: Finished dracut-pre-mount.service. Dec 13 02:04:06.273617 ignition[641]: Ignition finished successfully Dec 13 02:04:06.284873 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 02:04:06.314191 ignition[714]: Ignition 2.14.0 Dec 13 02:04:06.301825 systemd[1]: Starting ignition-fetch.service... Dec 13 02:04:06.314200 ignition[714]: Stage: fetch Dec 13 02:04:06.333566 unknown[714]: fetched base config from "system" Dec 13 02:04:06.314355 ignition[714]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:04:06.333590 unknown[714]: fetched base config from "system" Dec 13 02:04:06.314390 ignition[714]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 02:04:06.333606 unknown[714]: fetched user config from "gcp" Dec 13 02:04:06.322279 ignition[714]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 02:04:06.336955 systemd[1]: Finished ignition-fetch.service. Dec 13 02:04:06.322467 ignition[714]: parsed url from cmdline: "" Dec 13 02:04:06.350616 systemd[1]: Starting ignition-kargs.service... Dec 13 02:04:06.322473 ignition[714]: no config URL provided Dec 13 02:04:06.389833 systemd[1]: Finished ignition-kargs.service. Dec 13 02:04:06.322480 ignition[714]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 02:04:06.399037 systemd[1]: Starting ignition-disks.service... Dec 13 02:04:06.322491 ignition[714]: no config at "/usr/lib/ignition/user.ign" Dec 13 02:04:06.436763 systemd[1]: Finished ignition-disks.service. Dec 13 02:04:06.322529 ignition[714]: GET http://169.254.169.254/computeMetadata/v1/instance/attributes/user-data: attempt #1 Dec 13 02:04:06.451524 systemd[1]: Reached target initrd-root-device.target. Dec 13 02:04:06.328943 ignition[714]: GET result: OK Dec 13 02:04:06.467331 systemd[1]: Reached target local-fs-pre.target. Dec 13 02:04:06.329142 ignition[714]: parsing config with SHA512: dd844867f2131004589a6e6beb213f224bcc03ff42b1ea9bab10896fc114760940640fc5ef6777d6232c98fce6b40636293b44ce0a116869cd53108756fef6ea Dec 13 02:04:06.481308 systemd[1]: Reached target local-fs.target. Dec 13 02:04:06.335277 ignition[714]: fetch: fetch complete Dec 13 02:04:06.496291 systemd[1]: Reached target sysinit.target. Dec 13 02:04:06.335313 ignition[714]: fetch: fetch passed Dec 13 02:04:06.509299 systemd[1]: Reached target basic.target. Dec 13 02:04:06.335389 ignition[714]: Ignition finished successfully Dec 13 02:04:06.523620 systemd[1]: Starting systemd-fsck-root.service... Dec 13 02:04:06.364341 ignition[720]: Ignition 2.14.0 Dec 13 02:04:06.364350 ignition[720]: Stage: kargs Dec 13 02:04:06.364484 ignition[720]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:04:06.364516 ignition[720]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 02:04:06.372738 ignition[720]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 02:04:06.375736 ignition[720]: kargs: kargs passed Dec 13 02:04:06.375828 ignition[720]: Ignition finished successfully Dec 13 02:04:06.410387 ignition[726]: Ignition 2.14.0 Dec 13 02:04:06.410399 ignition[726]: Stage: disks Dec 13 02:04:06.410582 ignition[726]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:04:06.410623 ignition[726]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 02:04:06.417681 ignition[726]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 02:04:06.418929 ignition[726]: disks: disks passed Dec 13 02:04:06.418977 ignition[726]: Ignition finished successfully Dec 13 02:04:06.558694 systemd-fsck[734]: ROOT: clean, 621/1628000 files, 124058/1617920 blocks Dec 13 02:04:06.767077 systemd[1]: Finished systemd-fsck-root.service. Dec 13 02:04:06.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:06.776547 systemd[1]: Mounting sysroot.mount... Dec 13 02:04:06.807432 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 02:04:06.804146 systemd[1]: Mounted sysroot.mount. Dec 13 02:04:06.814539 systemd[1]: Reached target initrd-root-fs.target. Dec 13 02:04:06.835050 systemd[1]: Mounting sysroot-usr.mount... Dec 13 02:04:06.849753 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 02:04:06.849833 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 02:04:06.849880 systemd[1]: Reached target ignition-diskful.target. Dec 13 02:04:06.870879 systemd[1]: Mounted sysroot-usr.mount. Dec 13 02:04:06.922319 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (740) Dec 13 02:04:06.922362 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 02:04:06.922386 kernel: BTRFS info (device sda6): using free space tree Dec 13 02:04:06.890865 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 02:04:06.933566 kernel: BTRFS info (device sda6): has skinny extents Dec 13 02:04:06.946154 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 02:04:06.954332 systemd[1]: Starting initrd-setup-root.service... Dec 13 02:04:06.964394 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 02:04:06.990482 initrd-setup-root[763]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 02:04:07.000256 initrd-setup-root[771]: cut: /sysroot/etc/group: No such file or directory Dec 13 02:04:07.011244 initrd-setup-root[779]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 02:04:07.021277 initrd-setup-root[787]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 02:04:07.061004 systemd[1]: Finished initrd-setup-root.service. Dec 13 02:04:07.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:07.062320 systemd[1]: Starting ignition-mount.service... Dec 13 02:04:07.090290 systemd[1]: Starting sysroot-boot.service... Dec 13 02:04:07.098414 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 02:04:07.098538 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 02:04:07.123436 ignition[805]: INFO : Ignition 2.14.0 Dec 13 02:04:07.123436 ignition[805]: INFO : Stage: mount Dec 13 02:04:07.123436 ignition[805]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:04:07.123436 ignition[805]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 02:04:07.230298 kernel: kauditd_printk_skb: 24 callbacks suppressed Dec 13 02:04:07.230344 kernel: audit: type=1130 audit(1734055447.139:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:07.230372 kernel: audit: type=1130 audit(1734055447.189:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:07.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:07.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:07.230520 ignition[805]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 02:04:07.230520 ignition[805]: INFO : mount: mount passed Dec 13 02:04:07.230520 ignition[805]: INFO : Ignition finished successfully Dec 13 02:04:07.303280 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (815) Dec 13 02:04:07.303337 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 02:04:07.303358 kernel: BTRFS info (device sda6): using free space tree Dec 13 02:04:07.303379 kernel: BTRFS info (device sda6): has skinny extents Dec 13 02:04:07.303400 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 02:04:07.129890 systemd[1]: Finished ignition-mount.service. Dec 13 02:04:07.142965 systemd[1]: Finished sysroot-boot.service. Dec 13 02:04:07.191831 systemd[1]: Starting ignition-files.service... Dec 13 02:04:07.332314 ignition[834]: INFO : Ignition 2.14.0 Dec 13 02:04:07.332314 ignition[834]: INFO : Stage: files Dec 13 02:04:07.332314 ignition[834]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:04:07.332314 ignition[834]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 02:04:07.389244 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (834) Dec 13 02:04:07.241450 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 02:04:07.398288 ignition[834]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 02:04:07.398288 ignition[834]: DEBUG : files: compiled without relabeling support, skipping Dec 13 02:04:07.398288 ignition[834]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 02:04:07.398288 ignition[834]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 02:04:07.398288 ignition[834]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 02:04:07.398288 ignition[834]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 02:04:07.398288 ignition[834]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 02:04:07.398288 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/hosts" Dec 13 02:04:07.398288 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(3): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 02:04:07.398288 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2168299051" Dec 13 02:04:07.398288 ignition[834]: CRITICAL : files: createFilesystemsFiles: createFiles: op(3): op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2168299051": device or resource busy Dec 13 02:04:07.398288 ignition[834]: ERROR : files: createFilesystemsFiles: createFiles: op(3): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2168299051", trying btrfs: device or resource busy Dec 13 02:04:07.398288 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2168299051" Dec 13 02:04:07.398288 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2168299051" Dec 13 02:04:07.398288 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [started] unmounting "/mnt/oem2168299051" Dec 13 02:04:07.398288 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [finished] unmounting "/mnt/oem2168299051" Dec 13 02:04:07.398288 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/hosts" Dec 13 02:04:07.398288 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 02:04:07.303317 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 02:04:07.672440 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Dec 13 02:04:07.672440 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Dec 13 02:04:07.329236 systemd-networkd[689]: eth0: Gained IPv6LL Dec 13 02:04:07.353607 unknown[834]: wrote ssh authorized keys file for user: core Dec 13 02:04:07.727883 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 02:04:07.745251 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Dec 13 02:04:07.745251 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(8): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 02:04:07.745251 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(9): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1165152966" Dec 13 02:04:07.745251 ignition[834]: CRITICAL : files: createFilesystemsFiles: createFiles: op(8): op(9): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1165152966": device or resource busy Dec 13 02:04:07.745251 ignition[834]: ERROR : files: createFilesystemsFiles: createFiles: op(8): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1165152966", trying btrfs: device or resource busy Dec 13 02:04:07.745251 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1165152966" Dec 13 02:04:07.745251 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(a): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1165152966" Dec 13 02:04:07.745251 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(b): [started] unmounting "/mnt/oem1165152966" Dec 13 02:04:07.745251 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(b): [finished] unmounting "/mnt/oem1165152966" Dec 13 02:04:07.745251 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Dec 13 02:04:07.745251 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/install.sh" Dec 13 02:04:07.745251 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 02:04:07.745251 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 02:04:07.745251 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 02:04:07.745251 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 02:04:07.990266 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 02:04:07.990266 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 02:04:07.990266 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 02:04:07.990266 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 02:04:07.990266 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 02:04:07.990266 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(11): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 02:04:07.990266 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(11): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 02:04:07.990266 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/etc/systemd/system/oem-gce.service" Dec 13 02:04:07.990266 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(12): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 02:04:07.990266 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(13): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2837357489" Dec 13 02:04:07.990266 ignition[834]: CRITICAL : files: createFilesystemsFiles: createFiles: op(12): op(13): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2837357489": device or resource busy Dec 13 02:04:07.990266 ignition[834]: ERROR : files: createFilesystemsFiles: createFiles: op(12): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2837357489", trying btrfs: device or resource busy Dec 13 02:04:07.990266 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2837357489" Dec 13 02:04:07.990266 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2837357489" Dec 13 02:04:08.234281 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [started] unmounting "/mnt/oem2837357489" Dec 13 02:04:08.234281 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [finished] unmounting "/mnt/oem2837357489" Dec 13 02:04:08.234281 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/etc/systemd/system/oem-gce.service" Dec 13 02:04:08.234281 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(16): [started] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Dec 13 02:04:08.234281 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(16): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 02:04:08.234281 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(17): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2275766073" Dec 13 02:04:08.234281 ignition[834]: CRITICAL : files: createFilesystemsFiles: createFiles: op(16): op(17): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2275766073": device or resource busy Dec 13 02:04:08.234281 ignition[834]: ERROR : files: createFilesystemsFiles: createFiles: op(16): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2275766073", trying btrfs: device or resource busy Dec 13 02:04:08.234281 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(18): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2275766073" Dec 13 02:04:08.234281 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(18): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2275766073" Dec 13 02:04:08.234281 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(19): [started] unmounting "/mnt/oem2275766073" Dec 13 02:04:08.234281 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(19): [finished] unmounting "/mnt/oem2275766073" Dec 13 02:04:08.234281 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(16): [finished] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Dec 13 02:04:08.234281 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(1a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 02:04:08.476294 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(1a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 Dec 13 02:04:08.476294 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(1a): GET result: OK Dec 13 02:04:09.674798 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(1a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 02:04:09.693392 ignition[834]: INFO : files: op(1b): [started] processing unit "oem-gce-enable-oslogin.service" Dec 13 02:04:09.693392 ignition[834]: INFO : files: op(1b): [finished] processing unit "oem-gce-enable-oslogin.service" Dec 13 02:04:09.693392 ignition[834]: INFO : files: op(1c): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 02:04:09.693392 ignition[834]: INFO : files: op(1c): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 02:04:09.693392 ignition[834]: INFO : files: op(1d): [started] processing unit "oem-gce.service" Dec 13 02:04:09.693392 ignition[834]: INFO : files: op(1d): [finished] processing unit "oem-gce.service" Dec 13 02:04:09.693392 ignition[834]: INFO : files: op(1e): [started] processing unit "prepare-helm.service" Dec 13 02:04:09.693392 ignition[834]: INFO : files: op(1e): op(1f): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 02:04:09.693392 ignition[834]: INFO : files: op(1e): op(1f): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 02:04:09.693392 ignition[834]: INFO : files: op(1e): [finished] processing unit "prepare-helm.service" Dec 13 02:04:09.693392 ignition[834]: INFO : files: op(20): [started] setting preset to enabled for "oem-gce.service" Dec 13 02:04:09.693392 ignition[834]: INFO : files: op(20): [finished] setting preset to enabled for "oem-gce.service" Dec 13 02:04:09.693392 ignition[834]: INFO : files: op(21): [started] setting preset to enabled for "prepare-helm.service" Dec 13 02:04:09.693392 ignition[834]: INFO : files: op(21): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 02:04:09.693392 ignition[834]: INFO : files: op(22): [started] setting preset to enabled for "oem-gce-enable-oslogin.service" Dec 13 02:04:09.693392 ignition[834]: INFO : files: op(22): [finished] setting preset to enabled for "oem-gce-enable-oslogin.service" Dec 13 02:04:09.693392 ignition[834]: INFO : files: op(23): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 02:04:09.693392 ignition[834]: INFO : files: op(23): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 02:04:09.693392 ignition[834]: INFO : files: createResultFile: createFiles: op(24): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 02:04:09.693392 ignition[834]: INFO : files: createResultFile: createFiles: op(24): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 02:04:09.693392 ignition[834]: INFO : files: files passed Dec 13 02:04:09.693392 ignition[834]: INFO : Ignition finished successfully Dec 13 02:04:10.215293 kernel: audit: type=1130 audit(1734055449.700:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.215365 kernel: audit: type=1130 audit(1734055449.779:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.215393 kernel: audit: type=1130 audit(1734055449.830:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.215415 kernel: audit: type=1131 audit(1734055449.830:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.215439 kernel: audit: type=1130 audit(1734055449.949:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.215454 kernel: audit: type=1131 audit(1734055449.970:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.215468 kernel: audit: type=1130 audit(1734055450.072:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:09.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:09.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:09.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:09.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:09.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:09.970000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:09.683663 systemd[1]: Finished ignition-files.service. Dec 13 02:04:10.250342 kernel: audit: type=1131 audit(1734055450.222:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.222000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:09.711667 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 02:04:09.733473 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 02:04:10.291480 initrd-setup-root-after-ignition[857]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 02:04:09.734628 systemd[1]: Starting ignition-quench.service... Dec 13 02:04:09.752825 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 02:04:09.780703 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 02:04:09.780859 systemd[1]: Finished ignition-quench.service. Dec 13 02:04:09.831683 systemd[1]: Reached target ignition-complete.target. Dec 13 02:04:09.902495 systemd[1]: Starting initrd-parse-etc.service... Dec 13 02:04:09.939351 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 02:04:09.939470 systemd[1]: Finished initrd-parse-etc.service. Dec 13 02:04:09.972017 systemd[1]: Reached target initrd-fs.target. Dec 13 02:04:10.001487 systemd[1]: Reached target initrd.target. Dec 13 02:04:10.019589 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 02:04:10.020972 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 02:04:10.464000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.037719 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 02:04:10.074871 systemd[1]: Starting initrd-cleanup.service... Dec 13 02:04:10.116615 systemd[1]: Stopped target nss-lookup.target. Dec 13 02:04:10.501000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.144606 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 02:04:10.518000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.179635 systemd[1]: Stopped target timers.target. Dec 13 02:04:10.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.207603 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 02:04:10.552201 ignition[872]: INFO : Ignition 2.14.0 Dec 13 02:04:10.552201 ignition[872]: INFO : Stage: umount Dec 13 02:04:10.552201 ignition[872]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:04:10.552201 ignition[872]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 02:04:10.207800 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 02:04:10.624385 iscsid[699]: iscsid shutting down. Dec 13 02:04:10.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.640391 ignition[872]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 02:04:10.640391 ignition[872]: INFO : umount: umount passed Dec 13 02:04:10.640391 ignition[872]: INFO : Ignition finished successfully Dec 13 02:04:10.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.679000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.223800 systemd[1]: Stopped target initrd.target. Dec 13 02:04:10.694000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.257577 systemd[1]: Stopped target basic.target. Dec 13 02:04:10.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.274646 systemd[1]: Stopped target ignition-complete.target. Dec 13 02:04:10.725000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.299554 systemd[1]: Stopped target ignition-diskful.target. Dec 13 02:04:10.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.327569 systemd[1]: Stopped target initrd-root-device.target. Dec 13 02:04:10.758000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.343573 systemd[1]: Stopped target remote-fs.target. Dec 13 02:04:10.359606 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 02:04:10.374633 systemd[1]: Stopped target sysinit.target. Dec 13 02:04:10.390579 systemd[1]: Stopped target local-fs.target. Dec 13 02:04:10.406604 systemd[1]: Stopped target local-fs-pre.target. Dec 13 02:04:10.414628 systemd[1]: Stopped target swap.target. Dec 13 02:04:10.844000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.441508 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 02:04:10.859000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.441720 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 02:04:10.465734 systemd[1]: Stopped target cryptsetup.target. Dec 13 02:04:10.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.481538 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 02:04:10.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.903000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.481730 systemd[1]: Stopped dracut-initqueue.service. Dec 13 02:04:10.502709 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 02:04:10.502888 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 02:04:10.519671 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 02:04:10.519864 systemd[1]: Stopped ignition-files.service. Dec 13 02:04:10.537194 systemd[1]: Stopping ignition-mount.service... Dec 13 02:04:10.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.566862 systemd[1]: Stopping iscsid.service... Dec 13 02:04:10.999000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.999000 audit: BPF prog-id=6 op=UNLOAD Dec 13 02:04:10.591591 systemd[1]: Stopping sysroot-boot.service... Dec 13 02:04:10.617328 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 02:04:11.028000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.617629 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 02:04:11.051000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.633717 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 02:04:11.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.633898 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 02:04:10.652638 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 02:04:10.653781 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 02:04:11.109000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.654012 systemd[1]: Stopped iscsid.service. Dec 13 02:04:10.660150 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 02:04:10.660263 systemd[1]: Stopped ignition-mount.service. Dec 13 02:04:11.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.680982 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 02:04:11.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.681100 systemd[1]: Stopped sysroot-boot.service. Dec 13 02:04:11.188000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.696048 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 02:04:10.696221 systemd[1]: Stopped ignition-disks.service. Dec 13 02:04:10.711432 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 02:04:11.227000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.711509 systemd[1]: Stopped ignition-kargs.service. Dec 13 02:04:11.243000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.726413 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 02:04:11.258000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.726502 systemd[1]: Stopped ignition-fetch.service. Dec 13 02:04:11.274000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.743429 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 02:04:11.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:11.289000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.743593 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 02:04:10.759433 systemd[1]: Stopped target paths.target. Dec 13 02:04:10.773289 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 02:04:10.775269 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 02:04:10.789283 systemd[1]: Stopped target slices.target. Dec 13 02:04:11.365280 systemd-journald[189]: Received SIGTERM from PID 1 (n/a). Dec 13 02:04:10.803300 systemd[1]: Stopped target sockets.target. Dec 13 02:04:10.816345 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 02:04:10.816422 systemd[1]: Closed iscsid.socket. Dec 13 02:04:10.830383 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 02:04:10.830492 systemd[1]: Stopped ignition-setup.service. Dec 13 02:04:10.845390 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 02:04:10.845482 systemd[1]: Stopped initrd-setup-root.service. Dec 13 02:04:10.860553 systemd[1]: Stopping iscsiuio.service... Dec 13 02:04:10.875749 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 02:04:10.875870 systemd[1]: Stopped iscsiuio.service. Dec 13 02:04:10.889644 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 02:04:10.889775 systemd[1]: Finished initrd-cleanup.service. Dec 13 02:04:10.905307 systemd[1]: Stopped target network.target. Dec 13 02:04:10.920461 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 02:04:10.920524 systemd[1]: Closed iscsiuio.socket. Dec 13 02:04:10.927702 systemd[1]: Stopping systemd-networkd.service... Dec 13 02:04:10.931186 systemd-networkd[689]: eth0: DHCPv6 lease lost Dec 13 02:04:10.949685 systemd[1]: Stopping systemd-resolved.service... Dec 13 02:04:10.964814 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 02:04:10.964942 systemd[1]: Stopped systemd-resolved.service. Dec 13 02:04:10.986064 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 02:04:10.986243 systemd[1]: Stopped systemd-networkd.service. Dec 13 02:04:11.000978 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 02:04:11.001022 systemd[1]: Closed systemd-networkd.socket. Dec 13 02:04:11.016459 systemd[1]: Stopping network-cleanup.service... Dec 13 02:04:11.029258 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 02:04:11.029379 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 02:04:11.029591 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 02:04:11.029643 systemd[1]: Stopped systemd-sysctl.service. Dec 13 02:04:11.052588 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 02:04:11.052655 systemd[1]: Stopped systemd-modules-load.service. Dec 13 02:04:11.068559 systemd[1]: Stopping systemd-udevd.service... Dec 13 02:04:11.094993 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 02:04:11.095711 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 02:04:11.095869 systemd[1]: Stopped systemd-udevd.service. Dec 13 02:04:11.112000 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 02:04:11.112090 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 02:04:11.126513 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 02:04:11.126579 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 02:04:11.141358 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 02:04:11.141456 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 02:04:11.158428 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 02:04:11.158508 systemd[1]: Stopped dracut-cmdline.service. Dec 13 02:04:11.173425 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 02:04:11.173515 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 02:04:11.190425 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 02:04:11.213405 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 02:04:11.213531 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 02:04:11.228620 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 02:04:11.228687 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 02:04:11.244506 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 02:04:11.244581 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 02:04:11.260925 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 02:04:11.261620 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 02:04:11.261729 systemd[1]: Stopped network-cleanup.service. Dec 13 02:04:11.275787 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 02:04:11.275902 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 02:04:11.290701 systemd[1]: Reached target initrd-switch-root.target. Dec 13 02:04:11.310411 systemd[1]: Starting initrd-switch-root.service... Dec 13 02:04:11.327015 systemd[1]: Switching root. Dec 13 02:04:11.375224 systemd-journald[189]: Journal stopped Dec 13 02:04:16.031526 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 02:04:16.031652 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 02:04:16.031686 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 02:04:16.031710 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 02:04:16.031733 kernel: SELinux: policy capability open_perms=1 Dec 13 02:04:16.031762 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 02:04:16.031791 kernel: SELinux: policy capability always_check_network=0 Dec 13 02:04:16.031818 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 02:04:16.031848 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 02:04:16.031871 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 02:04:16.032031 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 02:04:16.032059 systemd[1]: Successfully loaded SELinux policy in 111.162ms. Dec 13 02:04:16.032098 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.695ms. Dec 13 02:04:16.032165 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 02:04:16.032191 systemd[1]: Detected virtualization kvm. Dec 13 02:04:16.032217 systemd[1]: Detected architecture x86-64. Dec 13 02:04:16.032241 systemd[1]: Detected first boot. Dec 13 02:04:16.032271 systemd[1]: Initializing machine ID from VM UUID. Dec 13 02:04:16.032296 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 02:04:16.032322 systemd[1]: Populated /etc with preset unit settings. Dec 13 02:04:16.032347 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:04:16.032379 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:04:16.032407 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:04:16.032433 kernel: kauditd_printk_skb: 51 callbacks suppressed Dec 13 02:04:16.032458 kernel: audit: type=1334 audit(1734055455.149:89): prog-id=12 op=LOAD Dec 13 02:04:16.032486 kernel: audit: type=1334 audit(1734055455.149:90): prog-id=3 op=UNLOAD Dec 13 02:04:16.032509 kernel: audit: type=1334 audit(1734055455.154:91): prog-id=13 op=LOAD Dec 13 02:04:16.032532 kernel: audit: type=1334 audit(1734055455.161:92): prog-id=14 op=LOAD Dec 13 02:04:16.032555 kernel: audit: type=1334 audit(1734055455.161:93): prog-id=4 op=UNLOAD Dec 13 02:04:16.032578 kernel: audit: type=1334 audit(1734055455.161:94): prog-id=5 op=UNLOAD Dec 13 02:04:16.032601 kernel: audit: type=1334 audit(1734055455.168:95): prog-id=15 op=LOAD Dec 13 02:04:16.032622 kernel: audit: type=1334 audit(1734055455.168:96): prog-id=12 op=UNLOAD Dec 13 02:04:16.032643 kernel: audit: type=1334 audit(1734055455.175:97): prog-id=16 op=LOAD Dec 13 02:04:16.032663 kernel: audit: type=1334 audit(1734055455.203:98): prog-id=17 op=LOAD Dec 13 02:04:16.032689 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 02:04:16.032712 systemd[1]: Stopped initrd-switch-root.service. Dec 13 02:04:16.032736 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 02:04:16.032759 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 02:04:16.032782 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 02:04:16.032805 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 02:04:16.032839 systemd[1]: Created slice system-getty.slice. Dec 13 02:04:16.032866 systemd[1]: Created slice system-modprobe.slice. Dec 13 02:04:16.032888 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 02:04:16.032912 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 02:04:16.032936 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 02:04:16.032961 systemd[1]: Created slice user.slice. Dec 13 02:04:16.032984 systemd[1]: Started systemd-ask-password-console.path. Dec 13 02:04:16.033007 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 02:04:16.033030 systemd[1]: Set up automount boot.automount. Dec 13 02:04:16.033054 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 02:04:16.033081 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 02:04:16.033144 systemd[1]: Stopped target initrd-fs.target. Dec 13 02:04:16.033168 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 02:04:16.033199 systemd[1]: Reached target integritysetup.target. Dec 13 02:04:16.033223 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 02:04:16.033246 systemd[1]: Reached target remote-fs.target. Dec 13 02:04:16.033269 systemd[1]: Reached target slices.target. Dec 13 02:04:16.033292 systemd[1]: Reached target swap.target. Dec 13 02:04:16.033396 systemd[1]: Reached target torcx.target. Dec 13 02:04:16.033420 systemd[1]: Reached target veritysetup.target. Dec 13 02:04:16.033449 systemd[1]: Listening on systemd-coredump.socket. Dec 13 02:04:16.033474 systemd[1]: Listening on systemd-initctl.socket. Dec 13 02:04:16.033497 systemd[1]: Listening on systemd-networkd.socket. Dec 13 02:04:16.033521 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 02:04:16.033545 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 02:04:16.033569 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 02:04:16.033593 systemd[1]: Mounting dev-hugepages.mount... Dec 13 02:04:16.033622 systemd[1]: Mounting dev-mqueue.mount... Dec 13 02:04:16.033646 systemd[1]: Mounting media.mount... Dec 13 02:04:16.033675 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:04:16.033699 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 02:04:16.033723 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 02:04:16.033749 systemd[1]: Mounting tmp.mount... Dec 13 02:04:16.033772 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 02:04:16.033797 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:04:16.033821 systemd[1]: Starting kmod-static-nodes.service... Dec 13 02:04:16.033854 systemd[1]: Starting modprobe@configfs.service... Dec 13 02:04:16.033878 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:04:16.033906 systemd[1]: Starting modprobe@drm.service... Dec 13 02:04:16.033930 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:04:16.033955 systemd[1]: Starting modprobe@fuse.service... Dec 13 02:04:16.033979 systemd[1]: Starting modprobe@loop.service... Dec 13 02:04:16.034010 kernel: fuse: init (API version 7.34) Dec 13 02:04:16.034033 kernel: loop: module loaded Dec 13 02:04:16.034057 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 02:04:16.034081 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 02:04:16.034143 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 02:04:16.034172 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 02:04:16.034197 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 02:04:16.034227 systemd[1]: Stopped systemd-journald.service. Dec 13 02:04:16.034251 systemd[1]: Starting systemd-journald.service... Dec 13 02:04:16.034274 systemd[1]: Starting systemd-modules-load.service... Dec 13 02:04:16.034298 systemd[1]: Starting systemd-network-generator.service... Dec 13 02:04:16.034330 systemd-journald[997]: Journal started Dec 13 02:04:16.034422 systemd-journald[997]: Runtime Journal (/run/log/journal/f1727a7d078cd9982a81f19686a7ecbc) is 8.0M, max 148.8M, 140.8M free. Dec 13 02:04:11.374000 audit: BPF prog-id=9 op=UNLOAD Dec 13 02:04:11.685000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 02:04:11.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 02:04:11.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 02:04:11.846000 audit: BPF prog-id=10 op=LOAD Dec 13 02:04:11.846000 audit: BPF prog-id=10 op=UNLOAD Dec 13 02:04:11.846000 audit: BPF prog-id=11 op=LOAD Dec 13 02:04:11.846000 audit: BPF prog-id=11 op=UNLOAD Dec 13 02:04:12.011000 audit[905]: AVC avc: denied { associate } for pid=905 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 02:04:12.011000 audit[905]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8b2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=888 pid=905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:12.011000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 02:04:12.021000 audit[905]: AVC avc: denied { associate } for pid=905 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 02:04:12.021000 audit[905]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d989 a2=1ed a3=0 items=2 ppid=888 pid=905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:12.021000 audit: CWD cwd="/" Dec 13 02:04:12.021000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:12.021000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:12.021000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 02:04:15.149000 audit: BPF prog-id=12 op=LOAD Dec 13 02:04:15.149000 audit: BPF prog-id=3 op=UNLOAD Dec 13 02:04:15.154000 audit: BPF prog-id=13 op=LOAD Dec 13 02:04:15.161000 audit: BPF prog-id=14 op=LOAD Dec 13 02:04:15.161000 audit: BPF prog-id=4 op=UNLOAD Dec 13 02:04:15.161000 audit: BPF prog-id=5 op=UNLOAD Dec 13 02:04:15.168000 audit: BPF prog-id=15 op=LOAD Dec 13 02:04:15.168000 audit: BPF prog-id=12 op=UNLOAD Dec 13 02:04:15.175000 audit: BPF prog-id=16 op=LOAD Dec 13 02:04:15.203000 audit: BPF prog-id=17 op=LOAD Dec 13 02:04:15.203000 audit: BPF prog-id=13 op=UNLOAD Dec 13 02:04:15.203000 audit: BPF prog-id=14 op=UNLOAD Dec 13 02:04:15.205000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:15.232000 audit: BPF prog-id=15 op=UNLOAD Dec 13 02:04:15.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:15.246000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:15.951000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:15.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:15.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:15.986000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:15.987000 audit: BPF prog-id=18 op=LOAD Dec 13 02:04:15.987000 audit: BPF prog-id=19 op=LOAD Dec 13 02:04:15.987000 audit: BPF prog-id=20 op=LOAD Dec 13 02:04:15.987000 audit: BPF prog-id=16 op=UNLOAD Dec 13 02:04:15.987000 audit: BPF prog-id=17 op=UNLOAD Dec 13 02:04:16.027000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 02:04:16.027000 audit[997]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffff9cadb60 a2=4000 a3=7ffff9cadbfc items=0 ppid=1 pid=997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:16.027000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 02:04:15.148703 systemd[1]: Queued start job for default target multi-user.target. Dec 13 02:04:12.006204 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2024-12-13T02:04:12Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:04:15.206124 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 02:04:12.007268 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2024-12-13T02:04:12Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 02:04:12.007302 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2024-12-13T02:04:12Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 02:04:12.007356 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2024-12-13T02:04:12Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 02:04:12.007376 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2024-12-13T02:04:12Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 02:04:12.007437 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2024-12-13T02:04:12Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 02:04:12.007463 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2024-12-13T02:04:12Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 02:04:12.007785 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2024-12-13T02:04:12Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 02:04:12.007861 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2024-12-13T02:04:12Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 02:04:12.007889 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2024-12-13T02:04:12Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 02:04:12.011088 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2024-12-13T02:04:12Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 02:04:12.011176 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2024-12-13T02:04:12Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 02:04:12.011211 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2024-12-13T02:04:12Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 02:04:12.011242 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2024-12-13T02:04:12Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 02:04:12.011275 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2024-12-13T02:04:12Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 02:04:12.011300 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2024-12-13T02:04:12Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 02:04:14.525806 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2024-12-13T02:04:14Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:04:14.526122 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2024-12-13T02:04:14Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:04:14.526260 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2024-12-13T02:04:14Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:04:14.526489 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2024-12-13T02:04:14Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:04:14.526547 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2024-12-13T02:04:14Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 02:04:14.526618 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2024-12-13T02:04:14Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 02:04:16.045159 systemd[1]: Starting systemd-remount-fs.service... Dec 13 02:04:16.059213 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 02:04:16.078849 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 02:04:16.078964 systemd[1]: Stopped verity-setup.service. Dec 13 02:04:16.085000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:16.099136 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:04:16.108147 systemd[1]: Started systemd-journald.service. Dec 13 02:04:16.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:16.117810 systemd[1]: Mounted dev-hugepages.mount. Dec 13 02:04:16.125500 systemd[1]: Mounted dev-mqueue.mount. Dec 13 02:04:16.132484 systemd[1]: Mounted media.mount. Dec 13 02:04:16.139525 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 02:04:16.148471 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 02:04:16.157475 systemd[1]: Mounted tmp.mount. Dec 13 02:04:16.164607 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 02:04:16.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:16.173681 systemd[1]: Finished kmod-static-nodes.service. Dec 13 02:04:16.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:16.182690 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 02:04:16.182926 systemd[1]: Finished modprobe@configfs.service. Dec 13 02:04:16.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:16.190000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:16.191678 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:04:16.191915 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:04:16.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:16.199000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:16.200706 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 02:04:16.200928 systemd[1]: Finished modprobe@drm.service. Dec 13 02:04:16.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:16.208000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:16.209712 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:04:16.209951 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:04:16.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:16.217000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:16.218697 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 02:04:16.218913 systemd[1]: Finished modprobe@fuse.service. Dec 13 02:04:16.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:16.226000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:16.227695 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:04:16.227912 systemd[1]: Finished modprobe@loop.service. Dec 13 02:04:16.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:16.235000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:16.236710 systemd[1]: Finished systemd-modules-load.service. Dec 13 02:04:16.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:16.245665 systemd[1]: Finished systemd-network-generator.service. Dec 13 02:04:16.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:16.254712 systemd[1]: Finished systemd-remount-fs.service. Dec 13 02:04:16.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:16.263709 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 02:04:16.271000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:16.273095 systemd[1]: Reached target network-pre.target. Dec 13 02:04:16.282828 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 02:04:16.292700 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 02:04:16.299287 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 02:04:16.302049 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 02:04:16.310971 systemd[1]: Starting systemd-journal-flush.service... Dec 13 02:04:16.319307 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:04:16.321155 systemd[1]: Starting systemd-random-seed.service... Dec 13 02:04:16.328314 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:04:16.330198 systemd[1]: Starting systemd-sysctl.service... Dec 13 02:04:16.334226 systemd-journald[997]: Time spent on flushing to /var/log/journal/f1727a7d078cd9982a81f19686a7ecbc is 50.545ms for 1160 entries. Dec 13 02:04:16.334226 systemd-journald[997]: System Journal (/var/log/journal/f1727a7d078cd9982a81f19686a7ecbc) is 8.0M, max 584.8M, 576.8M free. Dec 13 02:04:16.445288 systemd-journald[997]: Received client request to flush runtime journal. Dec 13 02:04:16.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:16.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:16.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:16.347339 systemd[1]: Starting systemd-sysusers.service... Dec 13 02:04:16.355957 systemd[1]: Starting systemd-udev-settle.service... Dec 13 02:04:16.448643 udevadm[1011]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Dec 13 02:04:16.366737 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 02:04:16.375643 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 02:04:16.384657 systemd[1]: Finished systemd-random-seed.service. Dec 13 02:04:16.396827 systemd[1]: Reached target first-boot-complete.target. Dec 13 02:04:16.408409 systemd[1]: Finished systemd-sysctl.service. Dec 13 02:04:16.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:16.421281 systemd[1]: Finished systemd-sysusers.service. Dec 13 02:04:16.431323 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 02:04:16.446588 systemd[1]: Finished systemd-journal-flush.service. Dec 13 02:04:16.501173 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 02:04:16.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:17.039804 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 02:04:17.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:17.048000 audit: BPF prog-id=21 op=LOAD Dec 13 02:04:17.048000 audit: BPF prog-id=22 op=LOAD Dec 13 02:04:17.048000 audit: BPF prog-id=7 op=UNLOAD Dec 13 02:04:17.048000 audit: BPF prog-id=8 op=UNLOAD Dec 13 02:04:17.050316 systemd[1]: Starting systemd-udevd.service... Dec 13 02:04:17.073671 systemd-udevd[1017]: Using default interface naming scheme 'v252'. Dec 13 02:04:17.123315 systemd[1]: Started systemd-udevd.service. Dec 13 02:04:17.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:17.133000 audit: BPF prog-id=23 op=LOAD Dec 13 02:04:17.136300 systemd[1]: Starting systemd-networkd.service... Dec 13 02:04:17.151000 audit: BPF prog-id=24 op=LOAD Dec 13 02:04:17.151000 audit: BPF prog-id=25 op=LOAD Dec 13 02:04:17.152000 audit: BPF prog-id=26 op=LOAD Dec 13 02:04:17.154761 systemd[1]: Starting systemd-userdbd.service... Dec 13 02:04:17.203020 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 02:04:17.218668 systemd[1]: Started systemd-userdbd.service. Dec 13 02:04:17.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:17.302135 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 02:04:17.356144 kernel: ACPI: button: Power Button [PWRF] Dec 13 02:04:17.370229 systemd-networkd[1030]: lo: Link UP Dec 13 02:04:17.370242 systemd-networkd[1030]: lo: Gained carrier Dec 13 02:04:17.370990 systemd-networkd[1030]: Enumeration completed Dec 13 02:04:17.371191 systemd[1]: Started systemd-networkd.service. Dec 13 02:04:17.371471 systemd-networkd[1030]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 02:04:17.373511 systemd-networkd[1030]: eth0: Link UP Dec 13 02:04:17.373527 systemd-networkd[1030]: eth0: Gained carrier Dec 13 02:04:17.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:17.338000 audit[1032]: AVC avc: denied { confidentiality } for pid=1032 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 02:04:17.384296 systemd-networkd[1030]: eth0: DHCPv4 address 10.128.0.6/32, gateway 10.128.0.1 acquired from 169.254.169.254 Dec 13 02:04:17.338000 audit[1032]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55733f4a6ff0 a1=337fc a2=7fe9c5e6cbc5 a3=5 items=110 ppid=1017 pid=1032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:17.338000 audit: CWD cwd="/" Dec 13 02:04:17.338000 audit: PATH item=0 name=(null) inode=32 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=1 name=(null) inode=13245 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=2 name=(null) inode=13245 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=3 name=(null) inode=13246 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=4 name=(null) inode=13245 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=5 name=(null) inode=13247 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=6 name=(null) inode=13245 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=7 name=(null) inode=13248 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=8 name=(null) inode=13248 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=9 name=(null) inode=13249 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=10 name=(null) inode=13248 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=11 name=(null) inode=13250 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=12 name=(null) inode=13248 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=13 name=(null) inode=13251 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=14 name=(null) inode=13248 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=15 name=(null) inode=13252 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=16 name=(null) inode=13248 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=17 name=(null) inode=13253 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=18 name=(null) inode=13245 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=19 name=(null) inode=13254 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=20 name=(null) inode=13254 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=21 name=(null) inode=13255 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=22 name=(null) inode=13254 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=23 name=(null) inode=13256 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=24 name=(null) inode=13254 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=25 name=(null) inode=13257 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=26 name=(null) inode=13254 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=27 name=(null) inode=13258 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=28 name=(null) inode=13254 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=29 name=(null) inode=13259 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=30 name=(null) inode=13245 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=31 name=(null) inode=13260 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=32 name=(null) inode=13260 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=33 name=(null) inode=13261 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=34 name=(null) inode=13260 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=35 name=(null) inode=13262 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=36 name=(null) inode=13260 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=37 name=(null) inode=13263 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=38 name=(null) inode=13260 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=39 name=(null) inode=13264 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=40 name=(null) inode=13260 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=41 name=(null) inode=13265 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=42 name=(null) inode=13245 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=43 name=(null) inode=13266 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=44 name=(null) inode=13266 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=45 name=(null) inode=13267 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=46 name=(null) inode=13266 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=47 name=(null) inode=13268 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=48 name=(null) inode=13266 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=49 name=(null) inode=13269 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=50 name=(null) inode=13266 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=51 name=(null) inode=13270 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=52 name=(null) inode=13266 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=53 name=(null) inode=13271 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=54 name=(null) inode=32 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=55 name=(null) inode=13272 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=56 name=(null) inode=13272 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=57 name=(null) inode=13273 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=58 name=(null) inode=13272 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=59 name=(null) inode=13274 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=60 name=(null) inode=13272 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=61 name=(null) inode=13275 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=62 name=(null) inode=13275 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=63 name=(null) inode=13276 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=64 name=(null) inode=13275 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=65 name=(null) inode=13277 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=66 name=(null) inode=13275 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=67 name=(null) inode=13278 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=68 name=(null) inode=13275 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=69 name=(null) inode=13279 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=70 name=(null) inode=13275 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=71 name=(null) inode=13280 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=72 name=(null) inode=13272 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=73 name=(null) inode=13281 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=74 name=(null) inode=13281 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=75 name=(null) inode=13282 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=76 name=(null) inode=13281 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=77 name=(null) inode=13283 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=78 name=(null) inode=13281 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=79 name=(null) inode=13284 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=80 name=(null) inode=13281 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=81 name=(null) inode=13285 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=82 name=(null) inode=13281 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=83 name=(null) inode=13286 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=84 name=(null) inode=13272 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=85 name=(null) inode=13287 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=86 name=(null) inode=13287 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=87 name=(null) inode=13288 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=88 name=(null) inode=13287 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=89 name=(null) inode=13289 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=90 name=(null) inode=13287 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=91 name=(null) inode=13290 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=92 name=(null) inode=13287 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=93 name=(null) inode=13291 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=94 name=(null) inode=13287 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=95 name=(null) inode=13292 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=96 name=(null) inode=13272 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=97 name=(null) inode=13293 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=98 name=(null) inode=13293 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=99 name=(null) inode=13294 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=100 name=(null) inode=13293 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=101 name=(null) inode=13295 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=102 name=(null) inode=13293 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=103 name=(null) inode=13296 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=104 name=(null) inode=13293 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=105 name=(null) inode=13297 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=106 name=(null) inode=13293 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=107 name=(null) inode=13298 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PATH item=109 name=(null) inode=13304 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:17.338000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 02:04:17.443135 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Dec 13 02:04:17.443273 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Dec 13 02:04:17.462189 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1045) Dec 13 02:04:17.487134 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr Dec 13 02:04:17.495985 kernel: EDAC MC: Ver: 3.0.0 Dec 13 02:04:17.513360 kernel: ACPI: button: Sleep Button [SLPF] Dec 13 02:04:17.513622 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 02:04:17.544206 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 02:04:17.552626 systemd[1]: Finished systemd-udev-settle.service. Dec 13 02:04:17.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:17.563073 systemd[1]: Starting lvm2-activation-early.service... Dec 13 02:04:17.592243 lvm[1054]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 02:04:17.621471 systemd[1]: Finished lvm2-activation-early.service. Dec 13 02:04:17.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:17.630517 systemd[1]: Reached target cryptsetup.target. Dec 13 02:04:17.640810 systemd[1]: Starting lvm2-activation.service... Dec 13 02:04:17.647531 lvm[1055]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 02:04:17.675567 systemd[1]: Finished lvm2-activation.service. Dec 13 02:04:17.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:17.684502 systemd[1]: Reached target local-fs-pre.target. Dec 13 02:04:17.693338 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 02:04:17.693395 systemd[1]: Reached target local-fs.target. Dec 13 02:04:17.702340 systemd[1]: Reached target machines.target. Dec 13 02:04:17.713005 systemd[1]: Starting ldconfig.service... Dec 13 02:04:17.721160 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:04:17.721269 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:04:17.723164 systemd[1]: Starting systemd-boot-update.service... Dec 13 02:04:17.733128 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 02:04:17.742904 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 02:04:17.745442 systemd[1]: Starting systemd-sysext.service... Dec 13 02:04:17.746300 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1057 (bootctl) Dec 13 02:04:17.750787 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 02:04:17.766054 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 02:04:17.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:17.783557 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 02:04:17.790967 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 02:04:17.791423 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 02:04:17.821174 kernel: loop0: detected capacity change from 0 to 210664 Dec 13 02:04:17.910578 systemd-fsck[1066]: fsck.fat 4.2 (2021-01-31) Dec 13 02:04:17.910578 systemd-fsck[1066]: /dev/sda1: 789 files, 119291/258078 clusters Dec 13 02:04:17.913377 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 02:04:17.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:17.925446 systemd[1]: Mounting boot.mount... Dec 13 02:04:17.963843 systemd[1]: Mounted boot.mount. Dec 13 02:04:18.000083 systemd[1]: Finished systemd-boot-update.service. Dec 13 02:04:18.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:18.193007 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 02:04:18.193949 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 02:04:18.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:18.225141 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 02:04:18.260162 kernel: loop1: detected capacity change from 0 to 210664 Dec 13 02:04:18.283625 (sd-sysext)[1072]: Using extensions 'kubernetes'. Dec 13 02:04:18.284354 (sd-sysext)[1072]: Merged extensions into '/usr'. Dec 13 02:04:18.309573 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:04:18.312127 systemd[1]: Mounting usr-share-oem.mount... Dec 13 02:04:18.322135 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:04:18.324514 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:04:18.335037 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:04:18.344162 systemd[1]: Starting modprobe@loop.service... Dec 13 02:04:18.351316 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:04:18.351561 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:04:18.351776 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:04:18.356139 systemd[1]: Mounted usr-share-oem.mount. Dec 13 02:04:18.363827 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:04:18.364049 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:04:18.371000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:18.371000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:18.373076 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:04:18.373300 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:04:18.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:18.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:18.383056 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:04:18.383299 systemd[1]: Finished modprobe@loop.service. Dec 13 02:04:18.384441 ldconfig[1056]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 02:04:18.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:18.390000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:18.391997 systemd[1]: Finished ldconfig.service. Dec 13 02:04:18.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:18.400089 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:04:18.400270 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:04:18.401721 systemd[1]: Finished systemd-sysext.service. Dec 13 02:04:18.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:18.412153 systemd[1]: Starting ensure-sysext.service... Dec 13 02:04:18.420778 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 02:04:18.433667 systemd[1]: Reloading. Dec 13 02:04:18.439502 systemd-tmpfiles[1079]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 02:04:18.443707 systemd-tmpfiles[1079]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 02:04:18.447688 systemd-tmpfiles[1079]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 02:04:18.554802 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2024-12-13T02:04:18Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:04:18.556020 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2024-12-13T02:04:18Z" level=info msg="torcx already run" Dec 13 02:04:18.715448 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:04:18.715474 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:04:18.739457 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:04:18.815000 audit: BPF prog-id=27 op=LOAD Dec 13 02:04:18.815000 audit: BPF prog-id=24 op=UNLOAD Dec 13 02:04:18.815000 audit: BPF prog-id=28 op=LOAD Dec 13 02:04:18.815000 audit: BPF prog-id=29 op=LOAD Dec 13 02:04:18.815000 audit: BPF prog-id=25 op=UNLOAD Dec 13 02:04:18.815000 audit: BPF prog-id=26 op=UNLOAD Dec 13 02:04:18.815000 audit: BPF prog-id=30 op=LOAD Dec 13 02:04:18.816000 audit: BPF prog-id=31 op=LOAD Dec 13 02:04:18.816000 audit: BPF prog-id=21 op=UNLOAD Dec 13 02:04:18.816000 audit: BPF prog-id=22 op=UNLOAD Dec 13 02:04:18.820000 audit: BPF prog-id=32 op=LOAD Dec 13 02:04:18.820000 audit: BPF prog-id=23 op=UNLOAD Dec 13 02:04:18.821000 audit: BPF prog-id=33 op=LOAD Dec 13 02:04:18.821000 audit: BPF prog-id=18 op=UNLOAD Dec 13 02:04:18.821000 audit: BPF prog-id=34 op=LOAD Dec 13 02:04:18.821000 audit: BPF prog-id=35 op=LOAD Dec 13 02:04:18.821000 audit: BPF prog-id=19 op=UNLOAD Dec 13 02:04:18.821000 audit: BPF prog-id=20 op=UNLOAD Dec 13 02:04:18.830274 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 02:04:18.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:18.845979 systemd[1]: Starting audit-rules.service... Dec 13 02:04:18.855163 systemd[1]: Starting clean-ca-certificates.service... Dec 13 02:04:18.865563 systemd[1]: Starting oem-gce-enable-oslogin.service... Dec 13 02:04:18.877214 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 02:04:18.885000 audit: BPF prog-id=36 op=LOAD Dec 13 02:04:18.888523 systemd[1]: Starting systemd-resolved.service... Dec 13 02:04:18.895000 audit: BPF prog-id=37 op=LOAD Dec 13 02:04:18.898696 systemd[1]: Starting systemd-timesyncd.service... Dec 13 02:04:18.908739 systemd[1]: Starting systemd-update-utmp.service... Dec 13 02:04:18.918668 systemd[1]: Finished clean-ca-certificates.service. Dec 13 02:04:18.921000 audit[1168]: SYSTEM_BOOT pid=1168 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 02:04:18.926000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:18.927908 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Dec 13 02:04:18.928221 systemd[1]: Finished oem-gce-enable-oslogin.service. Dec 13 02:04:18.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:18.935000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:18.941810 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:04:18.942368 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:04:18.944912 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:04:18.955369 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:04:18.964819 systemd[1]: Starting modprobe@loop.service... Dec 13 02:04:18.967000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 02:04:18.967000 audit[1173]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffee87511b0 a2=420 a3=0 items=0 ppid=1143 pid=1173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:18.967000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 02:04:18.968636 augenrules[1173]: No rules Dec 13 02:04:18.974650 systemd[1]: Starting oem-gce-enable-oslogin.service... Dec 13 02:04:18.981194 enable-oslogin[1181]: /etc/pam.d/sshd already exists. Not enabling OS Login Dec 13 02:04:18.983325 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:04:18.983710 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:04:18.984045 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 02:04:18.984338 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:04:18.988328 systemd[1]: Finished audit-rules.service. Dec 13 02:04:18.996260 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 02:04:19.007264 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:04:19.007509 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:04:19.017257 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:04:19.017484 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:04:19.027309 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:04:19.027549 systemd[1]: Finished modprobe@loop.service. Dec 13 02:04:19.037198 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Dec 13 02:04:19.037434 systemd[1]: Finished oem-gce-enable-oslogin.service. Dec 13 02:04:19.047325 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:04:19.047612 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:04:19.050422 systemd[1]: Starting systemd-update-done.service... Dec 13 02:04:19.058322 systemd[1]: Finished systemd-update-utmp.service. Dec 13 02:04:19.068071 systemd[1]: Finished systemd-update-done.service. Dec 13 02:04:19.068517 systemd-resolved[1159]: Positive Trust Anchors: Dec 13 02:04:19.068543 systemd-resolved[1159]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 02:04:19.068606 systemd-resolved[1159]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 02:04:19.074602 systemd-timesyncd[1163]: Contacted time server 169.254.169.254:123 (169.254.169.254). Dec 13 02:04:19.075047 systemd-timesyncd[1163]: Initial clock synchronization to Fri 2024-12-13 02:04:19.033742 UTC. Dec 13 02:04:19.077800 systemd[1]: Started systemd-timesyncd.service. Dec 13 02:04:19.090651 systemd[1]: Reached target time-set.target. Dec 13 02:04:19.099466 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:04:19.099975 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:04:19.102404 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:04:19.106860 systemd-resolved[1159]: Defaulting to hostname 'linux'. Dec 13 02:04:19.112076 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:04:19.121117 systemd[1]: Starting modprobe@loop.service... Dec 13 02:04:19.130130 systemd[1]: Starting oem-gce-enable-oslogin.service... Dec 13 02:04:19.134589 enable-oslogin[1188]: /etc/pam.d/sshd already exists. Not enabling OS Login Dec 13 02:04:19.138372 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:04:19.138660 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:04:19.138883 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 02:04:19.139052 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:04:19.140893 systemd[1]: Started systemd-resolved.service. Dec 13 02:04:19.150381 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:04:19.150667 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:04:19.160007 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:04:19.160276 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:04:19.168966 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:04:19.169210 systemd[1]: Finished modprobe@loop.service. Dec 13 02:04:19.177919 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Dec 13 02:04:19.178183 systemd[1]: Finished oem-gce-enable-oslogin.service. Dec 13 02:04:19.190795 systemd[1]: Reached target network.target. Dec 13 02:04:19.200463 systemd[1]: Reached target nss-lookup.target. Dec 13 02:04:19.209467 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:04:19.209952 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:04:19.212009 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:04:19.221509 systemd[1]: Starting modprobe@drm.service... Dec 13 02:04:19.230504 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:04:19.240432 systemd[1]: Starting modprobe@loop.service... Dec 13 02:04:19.249626 systemd[1]: Starting oem-gce-enable-oslogin.service... Dec 13 02:04:19.253986 enable-oslogin[1193]: /etc/pam.d/sshd already exists. Not enabling OS Login Dec 13 02:04:19.258398 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:04:19.258671 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:04:19.260734 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 02:04:19.269338 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 02:04:19.269606 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:04:19.272240 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:04:19.272463 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:04:19.281985 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 02:04:19.282236 systemd[1]: Finished modprobe@drm.service. Dec 13 02:04:19.290934 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:04:19.291185 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:04:19.296329 systemd-networkd[1030]: eth0: Gained IPv6LL Dec 13 02:04:19.298936 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:04:19.299163 systemd[1]: Finished modprobe@loop.service. Dec 13 02:04:19.307963 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Dec 13 02:04:19.308226 systemd[1]: Finished oem-gce-enable-oslogin.service. Dec 13 02:04:19.318019 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 02:04:19.329411 systemd[1]: Reached target network-online.target. Dec 13 02:04:19.338409 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:04:19.338475 systemd[1]: Reached target sysinit.target. Dec 13 02:04:19.347404 systemd[1]: Started motdgen.path. Dec 13 02:04:19.354359 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 02:04:19.364635 systemd[1]: Started logrotate.timer. Dec 13 02:04:19.372526 systemd[1]: Started mdadm.timer. Dec 13 02:04:19.379361 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 02:04:19.388344 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 02:04:19.388413 systemd[1]: Reached target paths.target. Dec 13 02:04:19.395295 systemd[1]: Reached target timers.target. Dec 13 02:04:19.402781 systemd[1]: Listening on dbus.socket. Dec 13 02:04:19.411789 systemd[1]: Starting docker.socket... Dec 13 02:04:19.423675 systemd[1]: Listening on sshd.socket. Dec 13 02:04:19.431528 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:04:19.431639 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:04:19.432674 systemd[1]: Finished ensure-sysext.service. Dec 13 02:04:19.441633 systemd[1]: Listening on docker.socket. Dec 13 02:04:19.449545 systemd[1]: Reached target sockets.target. Dec 13 02:04:19.458285 systemd[1]: Reached target basic.target. Dec 13 02:04:19.465378 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 02:04:19.465429 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 02:04:19.467322 systemd[1]: Starting containerd.service... Dec 13 02:04:19.475879 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 02:04:19.486897 systemd[1]: Starting dbus.service... Dec 13 02:04:19.494280 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 02:04:19.505359 systemd[1]: Starting extend-filesystems.service... Dec 13 02:04:19.513235 jq[1200]: false Dec 13 02:04:19.512302 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 02:04:19.514940 systemd[1]: Starting kubelet.service... Dec 13 02:04:19.524225 systemd[1]: Starting motdgen.service... Dec 13 02:04:19.533260 systemd[1]: Starting oem-gce.service... Dec 13 02:04:19.542825 systemd[1]: Starting prepare-helm.service... Dec 13 02:04:19.552870 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 02:04:19.562194 systemd[1]: Starting sshd-keygen.service... Dec 13 02:04:19.573314 systemd[1]: Starting systemd-logind.service... Dec 13 02:04:19.576482 extend-filesystems[1201]: Found loop1 Dec 13 02:04:19.576482 extend-filesystems[1201]: Found sda Dec 13 02:04:19.576482 extend-filesystems[1201]: Found sda1 Dec 13 02:04:19.576482 extend-filesystems[1201]: Found sda2 Dec 13 02:04:19.576482 extend-filesystems[1201]: Found sda3 Dec 13 02:04:19.576482 extend-filesystems[1201]: Found usr Dec 13 02:04:19.576482 extend-filesystems[1201]: Found sda4 Dec 13 02:04:19.576482 extend-filesystems[1201]: Found sda6 Dec 13 02:04:19.576482 extend-filesystems[1201]: Found sda7 Dec 13 02:04:19.576482 extend-filesystems[1201]: Found sda9 Dec 13 02:04:19.576482 extend-filesystems[1201]: Checking size of /dev/sda9 Dec 13 02:04:19.703315 kernel: EXT4-fs (sda9): resizing filesystem from 1617920 to 2538491 blocks Dec 13 02:04:19.580293 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:04:19.703570 extend-filesystems[1201]: Resized partition /dev/sda9 Dec 13 02:04:19.580416 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionSecurity=!tpm2). Dec 13 02:04:19.712879 extend-filesystems[1231]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 02:04:19.581258 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 02:04:19.720815 jq[1225]: true Dec 13 02:04:19.582581 systemd[1]: Starting update-engine.service... Dec 13 02:04:19.598750 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 02:04:19.614700 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 02:04:19.615041 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 02:04:19.617537 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 02:04:19.723209 jq[1235]: true Dec 13 02:04:19.618047 systemd[1]: Finished motdgen.service. Dec 13 02:04:19.723618 mkfs.ext4[1237]: mke2fs 1.46.5 (30-Dec-2021) Dec 13 02:04:19.723618 mkfs.ext4[1237]: Discarding device blocks: 0/262144\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008 \u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008done Dec 13 02:04:19.723618 mkfs.ext4[1237]: Creating filesystem with 262144 4k blocks and 65536 inodes Dec 13 02:04:19.723618 mkfs.ext4[1237]: Filesystem UUID: ac30ca3a-e47f-49bc-bcc3-1ef6f63600be Dec 13 02:04:19.723618 mkfs.ext4[1237]: Superblock backups stored on blocks: Dec 13 02:04:19.723618 mkfs.ext4[1237]: 32768, 98304, 163840, 229376 Dec 13 02:04:19.723618 mkfs.ext4[1237]: Allocating group tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Dec 13 02:04:19.723618 mkfs.ext4[1237]: Writing inode tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Dec 13 02:04:19.723618 mkfs.ext4[1237]: Creating journal (8192 blocks): done Dec 13 02:04:19.723618 mkfs.ext4[1237]: Writing superblocks and filesystem accounting information: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Dec 13 02:04:19.636431 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 02:04:19.636798 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 02:04:19.738210 kernel: EXT4-fs (sda9): resized filesystem to 2538491 Dec 13 02:04:19.745810 dbus-daemon[1199]: [system] SELinux support is enabled Dec 13 02:04:19.753339 systemd[1]: Started dbus.service. Dec 13 02:04:19.764068 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 02:04:19.764133 systemd[1]: Reached target system-config.target. Dec 13 02:04:19.774865 tar[1233]: linux-amd64/helm Dec 13 02:04:19.775465 extend-filesystems[1231]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Dec 13 02:04:19.775465 extend-filesystems[1231]: old_desc_blocks = 1, new_desc_blocks = 2 Dec 13 02:04:19.775465 extend-filesystems[1231]: The filesystem on /dev/sda9 is now 2538491 (4k) blocks long. Dec 13 02:04:19.773339 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 02:04:19.813684 dbus-daemon[1199]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1030 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Dec 13 02:04:19.828656 extend-filesystems[1201]: Resized filesystem in /dev/sda9 Dec 13 02:04:19.859555 kernel: loop2: detected capacity change from 0 to 2097152 Dec 13 02:04:19.860322 update_engine[1223]: I1213 02:04:19.787358 1223 main.cc:92] Flatcar Update Engine starting Dec 13 02:04:19.860322 update_engine[1223]: I1213 02:04:19.832324 1223 update_check_scheduler.cc:74] Next update check in 11m39s Dec 13 02:04:19.773382 systemd[1]: Reached target user-config.target. Dec 13 02:04:19.861567 umount[1255]: umount: /var/lib/flatcar-oem-gce.img: not mounted. Dec 13 02:04:19.782837 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 02:04:19.783114 systemd[1]: Finished extend-filesystems.service. Dec 13 02:04:19.821416 systemd[1]: Starting systemd-hostnamed.service... Dec 13 02:04:19.835513 systemd[1]: Started update-engine.service. Dec 13 02:04:19.853263 systemd[1]: Started locksmithd.service. Dec 13 02:04:19.866066 bash[1264]: Updated "/home/core/.ssh/authorized_keys" Dec 13 02:04:19.869848 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 02:04:19.909998 env[1236]: time="2024-12-13T02:04:19.909881183Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 02:04:19.920147 kernel: EXT4-fs (loop2): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 02:04:19.933930 systemd-logind[1221]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 02:04:19.933977 systemd-logind[1221]: Watching system buttons on /dev/input/event3 (Sleep Button) Dec 13 02:04:19.934009 systemd-logind[1221]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 02:04:19.944275 systemd-logind[1221]: New seat seat0. Dec 13 02:04:19.955037 systemd[1]: Started systemd-logind.service. Dec 13 02:04:20.215848 env[1236]: time="2024-12-13T02:04:20.215787445Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 02:04:20.227132 env[1236]: time="2024-12-13T02:04:20.227040128Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:04:20.232312 env[1236]: time="2024-12-13T02:04:20.232205653Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:04:20.241390 env[1236]: time="2024-12-13T02:04:20.241066908Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:04:20.241995 env[1236]: time="2024-12-13T02:04:20.241953260Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:04:20.251228 env[1236]: time="2024-12-13T02:04:20.251165505Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 02:04:20.252512 env[1236]: time="2024-12-13T02:04:20.252469480Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 02:04:20.252695 env[1236]: time="2024-12-13T02:04:20.252671022Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 02:04:20.253034 env[1236]: time="2024-12-13T02:04:20.253006951Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:04:20.257543 env[1236]: time="2024-12-13T02:04:20.257498030Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:04:20.258548 env[1236]: time="2024-12-13T02:04:20.258500686Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:04:20.264860 env[1236]: time="2024-12-13T02:04:20.264810725Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 02:04:20.265255 env[1236]: time="2024-12-13T02:04:20.265193090Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 02:04:20.265414 env[1236]: time="2024-12-13T02:04:20.265390147Z" level=info msg="metadata content store policy set" policy=shared Dec 13 02:04:20.278913 env[1236]: time="2024-12-13T02:04:20.278846081Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 02:04:20.279179 env[1236]: time="2024-12-13T02:04:20.279144058Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 02:04:20.279322 env[1236]: time="2024-12-13T02:04:20.279298323Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 02:04:20.279497 env[1236]: time="2024-12-13T02:04:20.279465486Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 02:04:20.279683 env[1236]: time="2024-12-13T02:04:20.279660507Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 02:04:20.279843 env[1236]: time="2024-12-13T02:04:20.279820932Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 02:04:20.279975 env[1236]: time="2024-12-13T02:04:20.279956224Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 02:04:20.280096 env[1236]: time="2024-12-13T02:04:20.280075553Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 02:04:20.280250 env[1236]: time="2024-12-13T02:04:20.280227038Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 02:04:20.280403 env[1236]: time="2024-12-13T02:04:20.280379883Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 02:04:20.280545 env[1236]: time="2024-12-13T02:04:20.280522600Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 02:04:20.280669 env[1236]: time="2024-12-13T02:04:20.280649546Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 02:04:20.281038 env[1236]: time="2024-12-13T02:04:20.280990351Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 02:04:20.281403 env[1236]: time="2024-12-13T02:04:20.281376651Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 02:04:20.281976 env[1236]: time="2024-12-13T02:04:20.281942353Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 02:04:20.282177 env[1236]: time="2024-12-13T02:04:20.282150160Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 02:04:20.282299 env[1236]: time="2024-12-13T02:04:20.282275293Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 02:04:20.282487 env[1236]: time="2024-12-13T02:04:20.282464114Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 02:04:20.282688 env[1236]: time="2024-12-13T02:04:20.282662241Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 02:04:20.282822 env[1236]: time="2024-12-13T02:04:20.282785966Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 02:04:20.282964 env[1236]: time="2024-12-13T02:04:20.282942682Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 02:04:20.283086 env[1236]: time="2024-12-13T02:04:20.283064141Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 02:04:20.283227 env[1236]: time="2024-12-13T02:04:20.283203839Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 02:04:20.283335 env[1236]: time="2024-12-13T02:04:20.283312952Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 02:04:20.283438 env[1236]: time="2024-12-13T02:04:20.283418298Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 02:04:20.283564 env[1236]: time="2024-12-13T02:04:20.283543066Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 02:04:20.283846 env[1236]: time="2024-12-13T02:04:20.283820656Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 02:04:20.283992 env[1236]: time="2024-12-13T02:04:20.283965413Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 02:04:20.284134 env[1236]: time="2024-12-13T02:04:20.284087963Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 02:04:20.284270 env[1236]: time="2024-12-13T02:04:20.284234632Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 02:04:20.284406 env[1236]: time="2024-12-13T02:04:20.284378771Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 02:04:20.284506 env[1236]: time="2024-12-13T02:04:20.284487189Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 02:04:20.284625 env[1236]: time="2024-12-13T02:04:20.284602910Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 02:04:20.290267 env[1236]: time="2024-12-13T02:04:20.290217815Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 02:04:20.290829 env[1236]: time="2024-12-13T02:04:20.290736194Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 02:04:20.294637 env[1236]: time="2024-12-13T02:04:20.291609827Z" level=info msg="Connect containerd service" Dec 13 02:04:20.294637 env[1236]: time="2024-12-13T02:04:20.291683006Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 02:04:20.294637 env[1236]: time="2024-12-13T02:04:20.292620478Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 02:04:20.294637 env[1236]: time="2024-12-13T02:04:20.293012300Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 02:04:20.294637 env[1236]: time="2024-12-13T02:04:20.293090652Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 02:04:20.294637 env[1236]: time="2024-12-13T02:04:20.293205135Z" level=info msg="containerd successfully booted in 0.426328s" Dec 13 02:04:20.293335 systemd[1]: Started containerd.service. Dec 13 02:04:20.295851 env[1236]: time="2024-12-13T02:04:20.295799173Z" level=info msg="Start subscribing containerd event" Dec 13 02:04:20.296033 env[1236]: time="2024-12-13T02:04:20.295882781Z" level=info msg="Start recovering state" Dec 13 02:04:20.296033 env[1236]: time="2024-12-13T02:04:20.295980025Z" level=info msg="Start event monitor" Dec 13 02:04:20.296033 env[1236]: time="2024-12-13T02:04:20.296008656Z" level=info msg="Start snapshots syncer" Dec 13 02:04:20.296033 env[1236]: time="2024-12-13T02:04:20.296025600Z" level=info msg="Start cni network conf syncer for default" Dec 13 02:04:20.296248 env[1236]: time="2024-12-13T02:04:20.296039051Z" level=info msg="Start streaming server" Dec 13 02:04:20.310931 coreos-metadata[1198]: Dec 13 02:04:20.310 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/sshKeys: Attempt #1 Dec 13 02:04:20.316406 coreos-metadata[1198]: Dec 13 02:04:20.316 INFO Fetch failed with 404: resource not found Dec 13 02:04:20.316670 coreos-metadata[1198]: Dec 13 02:04:20.316 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/ssh-keys: Attempt #1 Dec 13 02:04:20.320436 coreos-metadata[1198]: Dec 13 02:04:20.320 INFO Fetch successful Dec 13 02:04:20.320756 coreos-metadata[1198]: Dec 13 02:04:20.320 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/block-project-ssh-keys: Attempt #1 Dec 13 02:04:20.321546 coreos-metadata[1198]: Dec 13 02:04:20.321 INFO Fetch failed with 404: resource not found Dec 13 02:04:20.321806 coreos-metadata[1198]: Dec 13 02:04:20.321 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/sshKeys: Attempt #1 Dec 13 02:04:20.324246 coreos-metadata[1198]: Dec 13 02:04:20.324 INFO Fetch failed with 404: resource not found Dec 13 02:04:20.324472 coreos-metadata[1198]: Dec 13 02:04:20.324 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/ssh-keys: Attempt #1 Dec 13 02:04:20.325933 coreos-metadata[1198]: Dec 13 02:04:20.325 INFO Fetch successful Dec 13 02:04:20.331367 unknown[1198]: wrote ssh authorized keys file for user: core Dec 13 02:04:20.359321 dbus-daemon[1199]: [system] Successfully activated service 'org.freedesktop.hostname1' Dec 13 02:04:20.359904 systemd[1]: Started systemd-hostnamed.service. Dec 13 02:04:20.361872 dbus-daemon[1199]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1265 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Dec 13 02:04:20.376495 systemd[1]: Starting polkit.service... Dec 13 02:04:20.413516 update-ssh-keys[1276]: Updated "/home/core/.ssh/authorized_keys" Dec 13 02:04:20.415298 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 02:04:20.503327 polkitd[1277]: Started polkitd version 121 Dec 13 02:04:20.539298 polkitd[1277]: Loading rules from directory /etc/polkit-1/rules.d Dec 13 02:04:20.539589 polkitd[1277]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 13 02:04:20.543279 polkitd[1277]: Finished loading, compiling and executing 2 rules Dec 13 02:04:20.544127 dbus-daemon[1199]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Dec 13 02:04:20.544350 systemd[1]: Started polkit.service. Dec 13 02:04:20.545269 polkitd[1277]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Dec 13 02:04:20.584984 systemd-hostnamed[1265]: Hostname set to (transient) Dec 13 02:04:20.589435 systemd-resolved[1159]: System hostname changed to 'ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal'. Dec 13 02:04:21.593140 tar[1233]: linux-amd64/LICENSE Dec 13 02:04:21.593140 tar[1233]: linux-amd64/README.md Dec 13 02:04:21.615229 systemd[1]: Finished prepare-helm.service. Dec 13 02:04:22.005279 systemd[1]: Started kubelet.service. Dec 13 02:04:22.520174 sshd_keygen[1234]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 02:04:22.606850 systemd[1]: Finished sshd-keygen.service. Dec 13 02:04:22.616405 systemd[1]: Starting issuegen.service... Dec 13 02:04:22.634165 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 02:04:22.634440 systemd[1]: Finished issuegen.service. Dec 13 02:04:22.644074 systemd[1]: Starting systemd-user-sessions.service... Dec 13 02:04:22.657741 systemd[1]: Finished systemd-user-sessions.service. Dec 13 02:04:22.668686 systemd[1]: Started getty@tty1.service. Dec 13 02:04:22.679193 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 02:04:22.687709 systemd[1]: Reached target getty.target. Dec 13 02:04:22.731789 locksmithd[1266]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 02:04:23.221231 kubelet[1287]: E1213 02:04:23.221180 1287 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:04:23.224234 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:04:23.224482 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:04:23.224926 systemd[1]: kubelet.service: Consumed 1.425s CPU time. Dec 13 02:04:25.475442 systemd[1]: var-lib-flatcar\x2doem\x2dgce.mount: Deactivated successfully. Dec 13 02:04:27.546168 kernel: loop2: detected capacity change from 0 to 2097152 Dec 13 02:04:27.570227 systemd-nspawn[1311]: Spawning container oem-gce on /var/lib/flatcar-oem-gce.img. Dec 13 02:04:27.570227 systemd-nspawn[1311]: Press ^] three times within 1s to kill container. Dec 13 02:04:27.588157 kernel: EXT4-fs (loop2): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 02:04:27.676124 systemd[1]: Started oem-gce.service. Dec 13 02:04:27.676998 systemd[1]: Reached target multi-user.target. Dec 13 02:04:27.679492 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 02:04:27.693318 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 02:04:27.693590 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 02:04:27.697256 systemd[1]: Startup finished in 1.009s (kernel) + 8.732s (initrd) + 16.138s (userspace) = 25.881s. Dec 13 02:04:27.753236 systemd-nspawn[1311]: + '[' -e /etc/default/instance_configs.cfg.template ']' Dec 13 02:04:27.753236 systemd-nspawn[1311]: + echo -e '[InstanceSetup]\nset_host_keys = false' Dec 13 02:04:27.753535 systemd-nspawn[1311]: + /usr/bin/google_instance_setup Dec 13 02:04:28.400389 instance-setup[1317]: INFO Running google_set_multiqueue. Dec 13 02:04:28.415450 instance-setup[1317]: INFO Set channels for eth0 to 2. Dec 13 02:04:28.419340 instance-setup[1317]: INFO Setting /proc/irq/31/smp_affinity_list to 0 for device virtio1. Dec 13 02:04:28.420882 instance-setup[1317]: INFO /proc/irq/31/smp_affinity_list: real affinity 0 Dec 13 02:04:28.421386 instance-setup[1317]: INFO Setting /proc/irq/32/smp_affinity_list to 0 for device virtio1. Dec 13 02:04:28.423040 instance-setup[1317]: INFO /proc/irq/32/smp_affinity_list: real affinity 0 Dec 13 02:04:28.423465 instance-setup[1317]: INFO Setting /proc/irq/33/smp_affinity_list to 1 for device virtio1. Dec 13 02:04:28.424828 instance-setup[1317]: INFO /proc/irq/33/smp_affinity_list: real affinity 1 Dec 13 02:04:28.425309 instance-setup[1317]: INFO Setting /proc/irq/34/smp_affinity_list to 1 for device virtio1. Dec 13 02:04:28.426815 instance-setup[1317]: INFO /proc/irq/34/smp_affinity_list: real affinity 1 Dec 13 02:04:28.438651 instance-setup[1317]: INFO Queue 0 XPS=1 for /sys/class/net/eth0/queues/tx-0/xps_cpus Dec 13 02:04:28.438816 instance-setup[1317]: INFO Queue 1 XPS=2 for /sys/class/net/eth0/queues/tx-1/xps_cpus Dec 13 02:04:28.484035 systemd-nspawn[1311]: + /usr/bin/google_metadata_script_runner --script-type startup Dec 13 02:04:28.829570 startup-script[1348]: INFO Starting startup scripts. Dec 13 02:04:28.842805 startup-script[1348]: INFO No startup scripts found in metadata. Dec 13 02:04:28.842968 startup-script[1348]: INFO Finished running startup scripts. Dec 13 02:04:28.879466 systemd-nspawn[1311]: + trap 'stopping=1 ; kill "${daemon_pids[@]}" || :' SIGTERM Dec 13 02:04:28.879466 systemd-nspawn[1311]: + daemon_pids=() Dec 13 02:04:28.880064 systemd-nspawn[1311]: + for d in accounts clock_skew network Dec 13 02:04:28.880454 systemd-nspawn[1311]: + daemon_pids+=($!) Dec 13 02:04:28.880555 systemd-nspawn[1311]: + for d in accounts clock_skew network Dec 13 02:04:28.880742 systemd-nspawn[1311]: + /usr/bin/google_accounts_daemon Dec 13 02:04:28.880954 systemd-nspawn[1311]: + daemon_pids+=($!) Dec 13 02:04:28.881071 systemd-nspawn[1311]: + for d in accounts clock_skew network Dec 13 02:04:28.881438 systemd-nspawn[1311]: + daemon_pids+=($!) Dec 13 02:04:28.881625 systemd-nspawn[1311]: + NOTIFY_SOCKET=/run/systemd/notify Dec 13 02:04:28.881625 systemd-nspawn[1311]: + /usr/bin/systemd-notify --ready Dec 13 02:04:28.881752 systemd-nspawn[1311]: + /usr/bin/google_network_daemon Dec 13 02:04:28.882351 systemd-nspawn[1311]: + /usr/bin/google_clock_skew_daemon Dec 13 02:04:28.948513 systemd-nspawn[1311]: + wait -n 36 37 38 Dec 13 02:04:29.331680 systemd[1]: Created slice system-sshd.slice. Dec 13 02:04:29.336284 systemd[1]: Started sshd@0-10.128.0.6:22-139.178.68.195:36162.service. Dec 13 02:04:29.556472 google-networking[1353]: INFO Starting Google Networking daemon. Dec 13 02:04:29.666270 sshd[1356]: Accepted publickey for core from 139.178.68.195 port 36162 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:04:29.669812 sshd[1356]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:04:29.678556 groupadd[1365]: group added to /etc/group: name=google-sudoers, GID=1000 Dec 13 02:04:29.679353 google-clock-skew[1352]: INFO Starting Google Clock Skew daemon. Dec 13 02:04:29.687866 groupadd[1365]: group added to /etc/gshadow: name=google-sudoers Dec 13 02:04:29.691141 systemd[1]: Created slice user-500.slice. Dec 13 02:04:29.696008 google-clock-skew[1352]: INFO Clock drift token has changed: 0. Dec 13 02:04:29.696047 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 02:04:29.708784 systemd-nspawn[1311]: hwclock: Cannot access the Hardware Clock via any known method. Dec 13 02:04:29.708784 systemd-nspawn[1311]: hwclock: Use the --verbose option to see the details of our search for an access method. Dec 13 02:04:29.707239 systemd-logind[1221]: New session 1 of user core. Dec 13 02:04:29.711478 google-clock-skew[1352]: WARNING Failed to sync system time with hardware clock. Dec 13 02:04:29.716745 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 02:04:29.719616 groupadd[1365]: new group: name=google-sudoers, GID=1000 Dec 13 02:04:29.721901 systemd[1]: Starting user@500.service... Dec 13 02:04:29.739156 (systemd)[1372]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:04:29.749539 google-accounts[1351]: INFO Starting Google Accounts daemon. Dec 13 02:04:29.782614 google-accounts[1351]: WARNING OS Login not installed. Dec 13 02:04:29.783659 google-accounts[1351]: INFO Creating a new user account for 0. Dec 13 02:04:29.789675 systemd-nspawn[1311]: useradd: invalid user name '0': use --badname to ignore Dec 13 02:04:29.790638 google-accounts[1351]: WARNING Could not create user 0. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', '0']' returned non-zero exit status 3.. Dec 13 02:04:29.870640 systemd[1372]: Queued start job for default target default.target. Dec 13 02:04:29.871456 systemd[1372]: Reached target paths.target. Dec 13 02:04:29.871496 systemd[1372]: Reached target sockets.target. Dec 13 02:04:29.871520 systemd[1372]: Reached target timers.target. Dec 13 02:04:29.871540 systemd[1372]: Reached target basic.target. Dec 13 02:04:29.871707 systemd[1]: Started user@500.service. Dec 13 02:04:29.873315 systemd[1]: Started session-1.scope. Dec 13 02:04:29.874146 systemd[1372]: Reached target default.target. Dec 13 02:04:29.874436 systemd[1372]: Startup finished in 117ms. Dec 13 02:04:30.096877 systemd[1]: Started sshd@1-10.128.0.6:22-139.178.68.195:36176.service. Dec 13 02:04:30.391604 sshd[1387]: Accepted publickey for core from 139.178.68.195 port 36176 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:04:30.393463 sshd[1387]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:04:30.400521 systemd[1]: Started session-2.scope. Dec 13 02:04:30.401160 systemd-logind[1221]: New session 2 of user core. Dec 13 02:04:30.609258 sshd[1387]: pam_unix(sshd:session): session closed for user core Dec 13 02:04:30.613388 systemd[1]: sshd@1-10.128.0.6:22-139.178.68.195:36176.service: Deactivated successfully. Dec 13 02:04:30.614468 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 02:04:30.615317 systemd-logind[1221]: Session 2 logged out. Waiting for processes to exit. Dec 13 02:04:30.616562 systemd-logind[1221]: Removed session 2. Dec 13 02:04:30.654045 systemd[1]: Started sshd@2-10.128.0.6:22-139.178.68.195:36180.service. Dec 13 02:04:30.945334 sshd[1393]: Accepted publickey for core from 139.178.68.195 port 36180 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:04:30.947066 sshd[1393]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:04:30.953367 systemd-logind[1221]: New session 3 of user core. Dec 13 02:04:30.954122 systemd[1]: Started session-3.scope. Dec 13 02:04:31.153861 sshd[1393]: pam_unix(sshd:session): session closed for user core Dec 13 02:04:31.157900 systemd[1]: sshd@2-10.128.0.6:22-139.178.68.195:36180.service: Deactivated successfully. Dec 13 02:04:31.158969 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 02:04:31.159803 systemd-logind[1221]: Session 3 logged out. Waiting for processes to exit. Dec 13 02:04:31.161008 systemd-logind[1221]: Removed session 3. Dec 13 02:04:31.200446 systemd[1]: Started sshd@3-10.128.0.6:22-139.178.68.195:36192.service. Dec 13 02:04:31.488336 sshd[1399]: Accepted publickey for core from 139.178.68.195 port 36192 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:04:31.490461 sshd[1399]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:04:31.496762 systemd-logind[1221]: New session 4 of user core. Dec 13 02:04:31.497586 systemd[1]: Started session-4.scope. Dec 13 02:04:31.701274 sshd[1399]: pam_unix(sshd:session): session closed for user core Dec 13 02:04:31.705366 systemd[1]: sshd@3-10.128.0.6:22-139.178.68.195:36192.service: Deactivated successfully. Dec 13 02:04:31.706440 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 02:04:31.707385 systemd-logind[1221]: Session 4 logged out. Waiting for processes to exit. Dec 13 02:04:31.708872 systemd-logind[1221]: Removed session 4. Dec 13 02:04:31.747598 systemd[1]: Started sshd@4-10.128.0.6:22-139.178.68.195:36200.service. Dec 13 02:04:32.038540 sshd[1405]: Accepted publickey for core from 139.178.68.195 port 36200 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:04:32.040409 sshd[1405]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:04:32.047832 systemd[1]: Started session-5.scope. Dec 13 02:04:32.048600 systemd-logind[1221]: New session 5 of user core. Dec 13 02:04:32.236959 sudo[1408]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 02:04:32.237425 sudo[1408]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:04:32.247395 dbus-daemon[1199]: \xd0\xed\xaeG\xd5U: received setenforce notice (enforcing=-547565024) Dec 13 02:04:32.249713 sudo[1408]: pam_unix(sudo:session): session closed for user root Dec 13 02:04:32.294523 sshd[1405]: pam_unix(sshd:session): session closed for user core Dec 13 02:04:32.299693 systemd[1]: sshd@4-10.128.0.6:22-139.178.68.195:36200.service: Deactivated successfully. Dec 13 02:04:32.300898 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 02:04:32.301814 systemd-logind[1221]: Session 5 logged out. Waiting for processes to exit. Dec 13 02:04:32.303397 systemd-logind[1221]: Removed session 5. Dec 13 02:04:32.340235 systemd[1]: Started sshd@5-10.128.0.6:22-139.178.68.195:36206.service. Dec 13 02:04:32.631846 sshd[1412]: Accepted publickey for core from 139.178.68.195 port 36206 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:04:32.633646 sshd[1412]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:04:32.639945 systemd-logind[1221]: New session 6 of user core. Dec 13 02:04:32.640752 systemd[1]: Started session-6.scope. Dec 13 02:04:32.808820 sudo[1416]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 02:04:32.809274 sudo[1416]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:04:32.813780 sudo[1416]: pam_unix(sudo:session): session closed for user root Dec 13 02:04:32.826664 sudo[1415]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 02:04:32.827084 sudo[1415]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:04:32.840252 systemd[1]: Stopping audit-rules.service... Dec 13 02:04:32.842000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 02:04:32.847719 kernel: kauditd_printk_skb: 212 callbacks suppressed Dec 13 02:04:32.847827 kernel: audit: type=1305 audit(1734055472.842:194): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 02:04:32.847869 auditctl[1419]: No rules Dec 13 02:04:32.848841 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 02:04:32.849095 systemd[1]: Stopped audit-rules.service. Dec 13 02:04:32.842000 audit[1419]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc1e2c8d80 a2=420 a3=0 items=0 ppid=1 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:32.864091 systemd[1]: Starting audit-rules.service... Dec 13 02:04:32.893253 kernel: audit: type=1300 audit(1734055472.842:194): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc1e2c8d80 a2=420 a3=0 items=0 ppid=1 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:32.893439 kernel: audit: type=1327 audit(1734055472.842:194): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 02:04:32.842000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 02:04:32.847000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:32.924584 kernel: audit: type=1131 audit(1734055472.847:195): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:32.930809 augenrules[1436]: No rules Dec 13 02:04:32.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:32.933145 sudo[1415]: pam_unix(sudo:session): session closed for user root Dec 13 02:04:32.931625 systemd[1]: Finished audit-rules.service. Dec 13 02:04:32.930000 audit[1415]: USER_END pid=1415 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:04:32.954185 kernel: audit: type=1130 audit(1734055472.930:196): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:32.954259 kernel: audit: type=1106 audit(1734055472.930:197): pid=1415 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:04:32.930000 audit[1415]: CRED_DISP pid=1415 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:04:32.980669 sshd[1412]: pam_unix(sshd:session): session closed for user core Dec 13 02:04:32.987020 systemd[1]: sshd@5-10.128.0.6:22-139.178.68.195:36206.service: Deactivated successfully. Dec 13 02:04:32.988231 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 02:04:32.990178 systemd-logind[1221]: Session 6 logged out. Waiting for processes to exit. Dec 13 02:04:32.991866 systemd-logind[1221]: Removed session 6. Dec 13 02:04:33.001703 kernel: audit: type=1104 audit(1734055472.930:198): pid=1415 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:04:32.982000 audit[1412]: USER_END pid=1412 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:04:33.002191 kernel: audit: type=1106 audit(1734055472.982:199): pid=1412 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:04:32.982000 audit[1412]: CRED_DISP pid=1412 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:04:33.050528 systemd[1]: Started sshd@6-10.128.0.6:22-139.178.68.195:36210.service. Dec 13 02:04:33.058870 kernel: audit: type=1104 audit(1734055472.982:200): pid=1412 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:04:32.986000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.6:22-139.178.68.195:36206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:33.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.6:22-139.178.68.195:36210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:33.086177 kernel: audit: type=1131 audit(1734055472.986:201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.6:22-139.178.68.195:36206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:33.278262 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 02:04:33.278689 systemd[1]: Stopped kubelet.service. Dec 13 02:04:33.278775 systemd[1]: kubelet.service: Consumed 1.425s CPU time. Dec 13 02:04:33.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:33.277000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:33.282355 systemd[1]: Starting kubelet.service... Dec 13 02:04:33.342000 audit[1442]: USER_ACCT pid=1442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:04:33.345040 sshd[1442]: Accepted publickey for core from 139.178.68.195 port 36210 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:04:33.344000 audit[1442]: CRED_ACQ pid=1442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:04:33.344000 audit[1442]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff439c6ad0 a2=3 a3=0 items=0 ppid=1 pid=1442 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:33.344000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:04:33.346279 sshd[1442]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:04:33.355473 systemd[1]: Started session-7.scope. Dec 13 02:04:33.357854 systemd-logind[1221]: New session 7 of user core. Dec 13 02:04:33.365000 audit[1442]: USER_START pid=1442 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:04:33.368000 audit[1446]: CRED_ACQ pid=1446 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:04:33.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:33.470552 systemd[1]: Started kubelet.service. Dec 13 02:04:33.524000 audit[1455]: USER_ACCT pid=1455 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:04:33.525935 sudo[1455]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 02:04:33.525000 audit[1455]: CRED_REFR pid=1455 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:04:33.526428 sudo[1455]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:04:33.528000 audit[1455]: USER_START pid=1455 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:04:33.564584 kubelet[1449]: E1213 02:04:33.564535 1449 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:04:33.569983 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:04:33.570245 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:04:33.569000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 02:04:33.574395 systemd[1]: Starting docker.service... Dec 13 02:04:33.624276 env[1465]: time="2024-12-13T02:04:33.624225562Z" level=info msg="Starting up" Dec 13 02:04:33.627004 env[1465]: time="2024-12-13T02:04:33.626942350Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 02:04:33.627004 env[1465]: time="2024-12-13T02:04:33.626972502Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 02:04:33.627004 env[1465]: time="2024-12-13T02:04:33.627002053Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 02:04:33.627289 env[1465]: time="2024-12-13T02:04:33.627016112Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 02:04:33.629257 env[1465]: time="2024-12-13T02:04:33.629213641Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 02:04:33.629257 env[1465]: time="2024-12-13T02:04:33.629236613Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 02:04:33.629257 env[1465]: time="2024-12-13T02:04:33.629259078Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 02:04:33.629501 env[1465]: time="2024-12-13T02:04:33.629272934Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 02:04:33.638146 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport1365477395-merged.mount: Deactivated successfully. Dec 13 02:04:33.670780 env[1465]: time="2024-12-13T02:04:33.670727773Z" level=info msg="Loading containers: start." Dec 13 02:04:33.758000 audit[1495]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1495 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:33.758000 audit[1495]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffd85741470 a2=0 a3=7ffd8574145c items=0 ppid=1465 pid=1495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:33.758000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 02:04:33.761000 audit[1497]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1497 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:33.761000 audit[1497]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd2708aba0 a2=0 a3=7ffd2708ab8c items=0 ppid=1465 pid=1497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:33.761000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 02:04:33.764000 audit[1499]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1499 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:33.764000 audit[1499]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe2a6a8bd0 a2=0 a3=7ffe2a6a8bbc items=0 ppid=1465 pid=1499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:33.764000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 02:04:33.767000 audit[1501]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1501 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:33.767000 audit[1501]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fffcb258f20 a2=0 a3=7fffcb258f0c items=0 ppid=1465 pid=1501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:33.767000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 02:04:33.771000 audit[1503]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1503 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:33.771000 audit[1503]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc6af70c10 a2=0 a3=7ffc6af70bfc items=0 ppid=1465 pid=1503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:33.771000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 02:04:33.794000 audit[1508]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1508 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:33.794000 audit[1508]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff58020ec0 a2=0 a3=7fff58020eac items=0 ppid=1465 pid=1508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:33.794000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 02:04:33.806000 audit[1510]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1510 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:33.806000 audit[1510]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff77312ca0 a2=0 a3=7fff77312c8c items=0 ppid=1465 pid=1510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:33.806000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 02:04:33.810000 audit[1512]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1512 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:33.810000 audit[1512]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fff28eb21a0 a2=0 a3=7fff28eb218c items=0 ppid=1465 pid=1512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:33.810000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 02:04:33.813000 audit[1514]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1514 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:33.813000 audit[1514]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fffa1fd99c0 a2=0 a3=7fffa1fd99ac items=0 ppid=1465 pid=1514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:33.813000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:04:33.827000 audit[1518]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1518 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:33.827000 audit[1518]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd8e6a0650 a2=0 a3=7ffd8e6a063c items=0 ppid=1465 pid=1518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:33.827000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:04:33.833000 audit[1519]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1519 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:33.833000 audit[1519]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe9eb1d010 a2=0 a3=7ffe9eb1cffc items=0 ppid=1465 pid=1519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:33.833000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:04:33.851141 kernel: Initializing XFRM netlink socket Dec 13 02:04:33.897853 env[1465]: time="2024-12-13T02:04:33.897787257Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 02:04:33.929000 audit[1527]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1527 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:33.929000 audit[1527]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffe14fda5e0 a2=0 a3=7ffe14fda5cc items=0 ppid=1465 pid=1527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:33.929000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 02:04:33.941000 audit[1530]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1530 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:33.941000 audit[1530]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffd96454d00 a2=0 a3=7ffd96454cec items=0 ppid=1465 pid=1530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:33.941000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 02:04:33.945000 audit[1533]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1533 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:33.945000 audit[1533]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe04cca160 a2=0 a3=7ffe04cca14c items=0 ppid=1465 pid=1533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:33.945000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 02:04:33.948000 audit[1535]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1535 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:33.948000 audit[1535]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd5c19a880 a2=0 a3=7ffd5c19a86c items=0 ppid=1465 pid=1535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:33.948000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 02:04:33.952000 audit[1537]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1537 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:33.952000 audit[1537]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fff379bffa0 a2=0 a3=7fff379bff8c items=0 ppid=1465 pid=1537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:33.952000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 02:04:33.955000 audit[1539]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1539 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:33.955000 audit[1539]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fff95aaf850 a2=0 a3=7fff95aaf83c items=0 ppid=1465 pid=1539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:33.955000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 02:04:33.959000 audit[1541]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1541 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:33.959000 audit[1541]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffd5b644010 a2=0 a3=7ffd5b643ffc items=0 ppid=1465 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:33.959000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 02:04:33.972000 audit[1544]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1544 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:33.972000 audit[1544]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fffadf7c4a0 a2=0 a3=7fffadf7c48c items=0 ppid=1465 pid=1544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:33.972000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 02:04:33.976000 audit[1546]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1546 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:33.976000 audit[1546]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffd7d2eb5d0 a2=0 a3=7ffd7d2eb5bc items=0 ppid=1465 pid=1546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:33.976000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 02:04:33.979000 audit[1548]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1548 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:33.979000 audit[1548]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffdd16c6f00 a2=0 a3=7ffdd16c6eec items=0 ppid=1465 pid=1548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:33.979000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 02:04:33.982000 audit[1550]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1550 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:33.982000 audit[1550]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc11f13df0 a2=0 a3=7ffc11f13ddc items=0 ppid=1465 pid=1550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:33.982000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 02:04:33.984021 systemd-networkd[1030]: docker0: Link UP Dec 13 02:04:33.997000 audit[1554]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1554 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:33.997000 audit[1554]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffa8be4420 a2=0 a3=7fffa8be440c items=0 ppid=1465 pid=1554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:33.997000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:04:34.003000 audit[1555]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1555 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:34.003000 audit[1555]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffcc75493c0 a2=0 a3=7ffcc75493ac items=0 ppid=1465 pid=1555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:34.003000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:04:34.005646 env[1465]: time="2024-12-13T02:04:34.005574981Z" level=info msg="Loading containers: done." Dec 13 02:04:34.026462 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1928837407-merged.mount: Deactivated successfully. Dec 13 02:04:34.034838 env[1465]: time="2024-12-13T02:04:34.034756132Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 02:04:34.035155 env[1465]: time="2024-12-13T02:04:34.035054736Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 02:04:34.035296 env[1465]: time="2024-12-13T02:04:34.035253448Z" level=info msg="Daemon has completed initialization" Dec 13 02:04:34.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:34.059299 systemd[1]: Started docker.service. Dec 13 02:04:34.071492 env[1465]: time="2024-12-13T02:04:34.071406929Z" level=info msg="API listen on /run/docker.sock" Dec 13 02:04:35.290154 env[1236]: time="2024-12-13T02:04:35.290075260Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.8\"" Dec 13 02:04:35.828790 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount685126908.mount: Deactivated successfully. Dec 13 02:04:37.719283 env[1236]: time="2024-12-13T02:04:37.719207220Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:37.722476 env[1236]: time="2024-12-13T02:04:37.722417303Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:772392d372035bf92e430e758ad0446146d82b7192358c8651252e4fb49c43dd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:37.725258 env[1236]: time="2024-12-13T02:04:37.725204843Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:37.727937 env[1236]: time="2024-12-13T02:04:37.727886757Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:f0e1b3de0c2e98e6c6abd73edf9d3b8e4d44460656cde0ebb92e2d9206961fcb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:37.729042 env[1236]: time="2024-12-13T02:04:37.728986575Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.8\" returns image reference \"sha256:772392d372035bf92e430e758ad0446146d82b7192358c8651252e4fb49c43dd\"" Dec 13 02:04:37.743890 env[1236]: time="2024-12-13T02:04:37.743838997Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.8\"" Dec 13 02:04:39.534500 env[1236]: time="2024-12-13T02:04:39.534408530Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:39.538266 env[1236]: time="2024-12-13T02:04:39.538186474Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:85333d41dd3ce32d8344280c6d533d4c8f66252e4c28e332a2322ba3837f7bd6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:39.540979 env[1236]: time="2024-12-13T02:04:39.540927522Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:39.543494 env[1236]: time="2024-12-13T02:04:39.543436157Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:124f66b7e877eb5a80a40503057299bb60e6a5f2130905f4e3293dabf194c397,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:39.544568 env[1236]: time="2024-12-13T02:04:39.544514075Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.8\" returns image reference \"sha256:85333d41dd3ce32d8344280c6d533d4c8f66252e4c28e332a2322ba3837f7bd6\"" Dec 13 02:04:39.558895 env[1236]: time="2024-12-13T02:04:39.558840253Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.8\"" Dec 13 02:04:40.800311 env[1236]: time="2024-12-13T02:04:40.800229469Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:40.803373 env[1236]: time="2024-12-13T02:04:40.803323511Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:eb53b988d5e03f329b5fdba21cbbbae48e1619b199689e7448095b31843b2c43,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:40.806678 env[1236]: time="2024-12-13T02:04:40.806618958Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:40.809579 env[1236]: time="2024-12-13T02:04:40.809525897Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c8bdeac2590c99c1a77e33995423ddb6633ff90a82a2aa455442e0a8079ef8c7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:40.812023 env[1236]: time="2024-12-13T02:04:40.811972636Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.8\" returns image reference \"sha256:eb53b988d5e03f329b5fdba21cbbbae48e1619b199689e7448095b31843b2c43\"" Dec 13 02:04:40.827750 env[1236]: time="2024-12-13T02:04:40.827674863Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\"" Dec 13 02:04:41.969910 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount364991785.mount: Deactivated successfully. Dec 13 02:04:42.677633 env[1236]: time="2024-12-13T02:04:42.677558532Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:42.680814 env[1236]: time="2024-12-13T02:04:42.680753059Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:42.683095 env[1236]: time="2024-12-13T02:04:42.683038915Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:42.685243 env[1236]: time="2024-12-13T02:04:42.685190492Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6d6be9417e22af78905000ac4fd134896bacd2188ea63c7cac8edd7a5d7e9b5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:42.685994 env[1236]: time="2024-12-13T02:04:42.685876313Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\" returns image reference \"sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2\"" Dec 13 02:04:42.700761 env[1236]: time="2024-12-13T02:04:42.700709985Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 02:04:43.173249 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3860046184.mount: Deactivated successfully. Dec 13 02:04:43.812670 kernel: kauditd_printk_skb: 88 callbacks suppressed Dec 13 02:04:43.812839 kernel: audit: type=1130 audit(1734055483.781:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:43.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:43.782728 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 02:04:43.783034 systemd[1]: Stopped kubelet.service. Dec 13 02:04:43.812245 systemd[1]: Starting kubelet.service... Dec 13 02:04:43.782000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:43.837476 kernel: audit: type=1131 audit(1734055483.782:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:44.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:44.056689 systemd[1]: Started kubelet.service. Dec 13 02:04:44.079144 kernel: audit: type=1130 audit(1734055484.056:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:44.147098 kubelet[1620]: E1213 02:04:44.147044 1620 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:04:44.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 02:04:44.150629 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:04:44.150849 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:04:44.173145 kernel: audit: type=1131 audit(1734055484.150:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 02:04:44.454060 env[1236]: time="2024-12-13T02:04:44.453888345Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:44.457171 env[1236]: time="2024-12-13T02:04:44.457087429Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:44.459832 env[1236]: time="2024-12-13T02:04:44.459754176Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:44.462663 env[1236]: time="2024-12-13T02:04:44.462617514Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:44.464330 env[1236]: time="2024-12-13T02:04:44.464280024Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Dec 13 02:04:44.480413 env[1236]: time="2024-12-13T02:04:44.480360975Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Dec 13 02:04:44.854817 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1735156314.mount: Deactivated successfully. Dec 13 02:04:44.860781 env[1236]: time="2024-12-13T02:04:44.860710844Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:44.863562 env[1236]: time="2024-12-13T02:04:44.863508152Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:44.866057 env[1236]: time="2024-12-13T02:04:44.866006645Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:44.868335 env[1236]: time="2024-12-13T02:04:44.868270389Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:44.869085 env[1236]: time="2024-12-13T02:04:44.869032752Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Dec 13 02:04:44.883510 env[1236]: time="2024-12-13T02:04:44.883397016Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\"" Dec 13 02:04:45.320040 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4108614273.mount: Deactivated successfully. Dec 13 02:04:48.179962 env[1236]: time="2024-12-13T02:04:48.179884691Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:48.183082 env[1236]: time="2024-12-13T02:04:48.183024055Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:48.185517 env[1236]: time="2024-12-13T02:04:48.185472701Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:48.187902 env[1236]: time="2024-12-13T02:04:48.187846306Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:44a8e24dcbba3470ee1fee21d5e88d128c936e9b55d4bc51fbef8086f8ed123b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:48.189125 env[1236]: time="2024-12-13T02:04:48.189048566Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\" returns image reference \"sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899\"" Dec 13 02:04:50.617739 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 13 02:04:50.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:50.642238 kernel: audit: type=1131 audit(1734055490.616:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:50.658000 audit: BPF prog-id=43 op=UNLOAD Dec 13 02:04:50.673895 kernel: audit: type=1334 audit(1734055490.658:245): prog-id=43 op=UNLOAD Dec 13 02:04:50.674042 kernel: audit: type=1334 audit(1734055490.658:246): prog-id=42 op=UNLOAD Dec 13 02:04:50.658000 audit: BPF prog-id=42 op=UNLOAD Dec 13 02:04:50.658000 audit: BPF prog-id=41 op=UNLOAD Dec 13 02:04:50.682151 kernel: audit: type=1334 audit(1734055490.658:247): prog-id=41 op=UNLOAD Dec 13 02:04:51.249504 systemd[1]: Stopped kubelet.service. Dec 13 02:04:51.273143 kernel: audit: type=1130 audit(1734055491.248:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:51.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:51.253482 systemd[1]: Starting kubelet.service... Dec 13 02:04:51.248000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:51.301151 kernel: audit: type=1131 audit(1734055491.248:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:51.310357 systemd[1]: Reloading. Dec 13 02:04:51.469415 /usr/lib/systemd/system-generators/torcx-generator[1731]: time="2024-12-13T02:04:51Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:04:51.471075 /usr/lib/systemd/system-generators/torcx-generator[1731]: time="2024-12-13T02:04:51Z" level=info msg="torcx already run" Dec 13 02:04:51.592522 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:04:51.592550 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:04:51.617065 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:04:51.757785 kernel: audit: type=1400 audit(1734055491.734:250): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.784965 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 02:04:51.785149 kernel: audit: type=1400 audit(1734055491.734:251): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.785204 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 02:04:51.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.755000 audit: BPF prog-id=46 op=LOAD Dec 13 02:04:51.755000 audit: BPF prog-id=27 op=UNLOAD Dec 13 02:04:51.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.755000 audit: BPF prog-id=47 op=LOAD Dec 13 02:04:51.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.755000 audit: BPF prog-id=48 op=LOAD Dec 13 02:04:51.755000 audit: BPF prog-id=28 op=UNLOAD Dec 13 02:04:51.755000 audit: BPF prog-id=29 op=UNLOAD Dec 13 02:04:51.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.756000 audit: BPF prog-id=49 op=LOAD Dec 13 02:04:51.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.756000 audit: BPF prog-id=50 op=LOAD Dec 13 02:04:51.756000 audit: BPF prog-id=30 op=UNLOAD Dec 13 02:04:51.756000 audit: BPF prog-id=31 op=UNLOAD Dec 13 02:04:51.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.757000 audit: BPF prog-id=51 op=LOAD Dec 13 02:04:51.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.795000 audit: BPF prog-id=52 op=LOAD Dec 13 02:04:51.795000 audit: BPF prog-id=37 op=UNLOAD Dec 13 02:04:51.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.801000 audit: BPF prog-id=53 op=LOAD Dec 13 02:04:51.801000 audit: BPF prog-id=36 op=UNLOAD Dec 13 02:04:51.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.803000 audit: BPF prog-id=54 op=LOAD Dec 13 02:04:51.803000 audit: BPF prog-id=38 op=UNLOAD Dec 13 02:04:51.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.803000 audit: BPF prog-id=55 op=LOAD Dec 13 02:04:51.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.804000 audit: BPF prog-id=56 op=LOAD Dec 13 02:04:51.804000 audit: BPF prog-id=39 op=UNLOAD Dec 13 02:04:51.804000 audit: BPF prog-id=40 op=UNLOAD Dec 13 02:04:51.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.805000 audit: BPF prog-id=57 op=LOAD Dec 13 02:04:51.805000 audit: BPF prog-id=32 op=UNLOAD Dec 13 02:04:51.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.808000 audit: BPF prog-id=58 op=LOAD Dec 13 02:04:51.808000 audit: BPF prog-id=33 op=UNLOAD Dec 13 02:04:51.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.808000 audit: BPF prog-id=59 op=LOAD Dec 13 02:04:51.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:51.809000 audit: BPF prog-id=60 op=LOAD Dec 13 02:04:51.809000 audit: BPF prog-id=34 op=UNLOAD Dec 13 02:04:51.809000 audit: BPF prog-id=35 op=UNLOAD Dec 13 02:04:51.909373 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Dec 13 02:04:51.909960 systemd[1]: kubelet.service: Failed with result 'signal'. Dec 13 02:04:51.910474 systemd[1]: Stopped kubelet.service. Dec 13 02:04:51.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 02:04:51.914064 systemd[1]: Starting kubelet.service... Dec 13 02:04:53.387210 systemd[1]: Started kubelet.service. Dec 13 02:04:53.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:53.458366 kubelet[1776]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:04:53.458366 kubelet[1776]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 02:04:53.458366 kubelet[1776]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:04:53.459465 kubelet[1776]: I1213 02:04:53.459339 1776 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 02:04:54.111074 kubelet[1776]: I1213 02:04:54.111017 1776 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 02:04:54.111074 kubelet[1776]: I1213 02:04:54.111051 1776 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 02:04:54.111416 kubelet[1776]: I1213 02:04:54.111393 1776 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 02:04:54.138949 kubelet[1776]: I1213 02:04:54.138903 1776 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 02:04:54.140173 kubelet[1776]: E1213 02:04:54.140146 1776 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.128.0.6:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.128.0.6:6443: connect: connection refused Dec 13 02:04:54.155409 kubelet[1776]: I1213 02:04:54.155367 1776 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 02:04:54.158065 kubelet[1776]: I1213 02:04:54.157988 1776 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 02:04:54.158696 kubelet[1776]: I1213 02:04:54.158053 1776 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 02:04:54.158929 kubelet[1776]: I1213 02:04:54.158729 1776 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 02:04:54.158929 kubelet[1776]: I1213 02:04:54.158751 1776 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 02:04:54.159051 kubelet[1776]: I1213 02:04:54.158938 1776 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:04:54.161398 kubelet[1776]: I1213 02:04:54.161370 1776 kubelet.go:400] "Attempting to sync node with API server" Dec 13 02:04:54.161548 kubelet[1776]: I1213 02:04:54.161531 1776 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 02:04:54.161662 kubelet[1776]: I1213 02:04:54.161649 1776 kubelet.go:312] "Adding apiserver pod source" Dec 13 02:04:54.161762 kubelet[1776]: I1213 02:04:54.161748 1776 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 02:04:54.165329 kubelet[1776]: W1213 02:04:54.164509 1776 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.128.0.6:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.6:6443: connect: connection refused Dec 13 02:04:54.165329 kubelet[1776]: E1213 02:04:54.164626 1776 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.6:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.6:6443: connect: connection refused Dec 13 02:04:54.173742 kubelet[1776]: W1213 02:04:54.173669 1776 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.128.0.6:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.6:6443: connect: connection refused Dec 13 02:04:54.173742 kubelet[1776]: E1213 02:04:54.173736 1776 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.6:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.6:6443: connect: connection refused Dec 13 02:04:54.173975 kubelet[1776]: I1213 02:04:54.173859 1776 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 02:04:54.180329 kubelet[1776]: I1213 02:04:54.180273 1776 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 02:04:54.180474 kubelet[1776]: W1213 02:04:54.180372 1776 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 02:04:54.181683 kubelet[1776]: I1213 02:04:54.181174 1776 server.go:1264] "Started kubelet" Dec 13 02:04:54.183058 kubelet[1776]: I1213 02:04:54.183000 1776 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 02:04:54.183595 kubelet[1776]: I1213 02:04:54.183524 1776 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 02:04:54.184018 kubelet[1776]: I1213 02:04:54.183989 1776 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 02:04:54.195024 kubelet[1776]: I1213 02:04:54.194964 1776 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 02:04:54.195306 kubelet[1776]: I1213 02:04:54.195282 1776 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 02:04:54.195520 kubelet[1776]: I1213 02:04:54.195504 1776 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 02:04:54.193000 audit[1776]: AVC avc: denied { mac_admin } for pid=1776 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:54.193000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:04:54.193000 audit[1776]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000950a50 a1=c0009ff2c0 a2=c000950a20 a3=25 items=0 ppid=1 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:54.193000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:04:54.194000 audit[1776]: AVC avc: denied { mac_admin } for pid=1776 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:54.194000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:04:54.194000 audit[1776]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b5a0c0 a1=c0009ff2d8 a2=c000950ae0 a3=25 items=0 ppid=1 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:54.194000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:04:54.198696 kubelet[1776]: I1213 02:04:54.198662 1776 server.go:455] "Adding debug handlers to kubelet server" Dec 13 02:04:54.200000 audit[1786]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1786 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:54.200000 audit[1786]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffe970fa40 a2=0 a3=7fffe970fa2c items=0 ppid=1776 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:54.200000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 02:04:54.202000 audit[1787]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1787 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:54.202000 audit[1787]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc8edbc470 a2=0 a3=7ffc8edbc45c items=0 ppid=1776 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:54.202000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 02:04:54.204528 kubelet[1776]: E1213 02:04:54.204369 1776 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.128.0.6:6443/api/v1/namespaces/default/events\": dial tcp 10.128.0.6:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal.18109a48d77b2cc8 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal,UID:ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal,},FirstTimestamp:2024-12-13 02:04:54.181137608 +0000 UTC m=+0.787752098,LastTimestamp:2024-12-13 02:04:54.181137608 +0000 UTC m=+0.787752098,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal,}" Dec 13 02:04:54.205471 kubelet[1776]: E1213 02:04:54.205445 1776 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 02:04:54.207740 kubelet[1776]: I1213 02:04:54.207722 1776 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 02:04:54.208021 kubelet[1776]: I1213 02:04:54.208002 1776 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 02:04:54.208244 kubelet[1776]: I1213 02:04:54.208228 1776 reconciler.go:26] "Reconciler: start to sync state" Dec 13 02:04:54.208944 kubelet[1776]: W1213 02:04:54.208858 1776 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.128.0.6:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.6:6443: connect: connection refused Dec 13 02:04:54.208944 kubelet[1776]: E1213 02:04:54.208926 1776 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.6:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.6:6443: connect: connection refused Dec 13 02:04:54.209777 kubelet[1776]: I1213 02:04:54.209742 1776 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 02:04:54.211841 kubelet[1776]: I1213 02:04:54.211813 1776 factory.go:221] Registration of the containerd container factory successfully Dec 13 02:04:54.210000 audit[1789]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1789 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:54.212036 kubelet[1776]: I1213 02:04:54.211853 1776 factory.go:221] Registration of the systemd container factory successfully Dec 13 02:04:54.210000 audit[1789]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff634af110 a2=0 a3=7fff634af0fc items=0 ppid=1776 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:54.210000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:04:54.214000 audit[1791]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1791 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:54.214000 audit[1791]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd86983c40 a2=0 a3=7ffd86983c2c items=0 ppid=1776 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:54.214000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:04:54.222202 kubelet[1776]: E1213 02:04:54.222149 1776 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.6:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.6:6443: connect: connection refused" interval="200ms" Dec 13 02:04:54.226000 audit[1794]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1794 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:54.226000 audit[1794]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc0ab79db0 a2=0 a3=7ffc0ab79d9c items=0 ppid=1776 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:54.226000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 02:04:54.227689 kubelet[1776]: I1213 02:04:54.227536 1776 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 02:04:54.228000 audit[1795]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1795 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:04:54.228000 audit[1795]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe8f72c830 a2=0 a3=7ffe8f72c81c items=0 ppid=1776 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:54.228000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 02:04:54.229625 kubelet[1776]: I1213 02:04:54.229497 1776 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 02:04:54.229625 kubelet[1776]: I1213 02:04:54.229527 1776 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 02:04:54.229625 kubelet[1776]: I1213 02:04:54.229555 1776 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 02:04:54.229787 kubelet[1776]: E1213 02:04:54.229619 1776 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 02:04:54.231000 audit[1797]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1797 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:54.231000 audit[1797]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffecd948e50 a2=0 a3=7ffecd948e3c items=0 ppid=1776 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:54.231000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 02:04:54.233000 audit[1798]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1798 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:54.233000 audit[1798]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff991c52e0 a2=0 a3=7fff991c52cc items=0 ppid=1776 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:54.233000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 02:04:54.234000 audit[1799]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1799 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:54.234000 audit[1799]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffed68aedd0 a2=0 a3=7ffed68aedbc items=0 ppid=1776 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:54.234000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 02:04:54.236000 audit[1800]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1800 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:04:54.236000 audit[1800]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdbf715c30 a2=0 a3=7ffdbf715c1c items=0 ppid=1776 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:54.236000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 02:04:54.238000 audit[1801]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1801 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:04:54.238000 audit[1801]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc4c9f2fe0 a2=0 a3=7ffc4c9f2fcc items=0 ppid=1776 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:54.238000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 02:04:54.243947 kubelet[1776]: W1213 02:04:54.243869 1776 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.128.0.6:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.6:6443: connect: connection refused Dec 13 02:04:54.244137 kubelet[1776]: E1213 02:04:54.243961 1776 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.6:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.6:6443: connect: connection refused Dec 13 02:04:54.246000 audit[1804]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1804 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:04:54.246000 audit[1804]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd50c4fa40 a2=0 a3=7ffd50c4fa2c items=0 ppid=1776 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:54.246000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 02:04:54.255977 kubelet[1776]: I1213 02:04:54.255946 1776 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 02:04:54.256239 kubelet[1776]: I1213 02:04:54.256218 1776 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 02:04:54.256366 kubelet[1776]: I1213 02:04:54.256352 1776 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:04:54.258985 kubelet[1776]: I1213 02:04:54.258956 1776 policy_none.go:49] "None policy: Start" Dec 13 02:04:54.260687 kubelet[1776]: I1213 02:04:54.260637 1776 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 02:04:54.260865 kubelet[1776]: I1213 02:04:54.260852 1776 state_mem.go:35] "Initializing new in-memory state store" Dec 13 02:04:54.273125 systemd[1]: Created slice kubepods.slice. Dec 13 02:04:54.279908 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 02:04:54.284118 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 02:04:54.290125 kubelet[1776]: I1213 02:04:54.290076 1776 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 02:04:54.289000 audit[1776]: AVC avc: denied { mac_admin } for pid=1776 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:54.289000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:04:54.289000 audit[1776]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000eb6e10 a1=c000ecd5d8 a2=c000eb6de0 a3=25 items=0 ppid=1 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:54.289000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:04:54.290649 kubelet[1776]: I1213 02:04:54.290626 1776 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 02:04:54.290905 kubelet[1776]: I1213 02:04:54.290866 1776 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 02:04:54.291138 kubelet[1776]: I1213 02:04:54.291121 1776 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 02:04:54.296333 kubelet[1776]: E1213 02:04:54.296283 1776 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal\" not found" Dec 13 02:04:54.313785 kubelet[1776]: I1213 02:04:54.313742 1776 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:04:54.314274 kubelet[1776]: E1213 02:04:54.314231 1776 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.128.0.6:6443/api/v1/nodes\": dial tcp 10.128.0.6:6443: connect: connection refused" node="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:04:54.330607 kubelet[1776]: I1213 02:04:54.330519 1776 topology_manager.go:215] "Topology Admit Handler" podUID="05f0ae08043c8b2b3508d2c518e1fa1f" podNamespace="kube-system" podName="kube-apiserver-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:04:54.337191 kubelet[1776]: I1213 02:04:54.337143 1776 topology_manager.go:215] "Topology Admit Handler" podUID="6d2bcccb7f5a36790c2387ea66556f55" podNamespace="kube-system" podName="kube-controller-manager-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:04:54.347179 kubelet[1776]: I1213 02:04:54.347142 1776 topology_manager.go:215] "Topology Admit Handler" podUID="761dbeec36cb8b8c786ab96d71362215" podNamespace="kube-system" podName="kube-scheduler-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:04:54.353461 systemd[1]: Created slice kubepods-burstable-pod05f0ae08043c8b2b3508d2c518e1fa1f.slice. Dec 13 02:04:54.366021 systemd[1]: Created slice kubepods-burstable-pod6d2bcccb7f5a36790c2387ea66556f55.slice. Dec 13 02:04:54.376199 systemd[1]: Created slice kubepods-burstable-pod761dbeec36cb8b8c786ab96d71362215.slice. Dec 13 02:04:54.408836 kubelet[1776]: I1213 02:04:54.408650 1776 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/761dbeec36cb8b8c786ab96d71362215-kubeconfig\") pod \"kube-scheduler-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal\" (UID: \"761dbeec36cb8b8c786ab96d71362215\") " pod="kube-system/kube-scheduler-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:04:54.409061 kubelet[1776]: I1213 02:04:54.408920 1776 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/05f0ae08043c8b2b3508d2c518e1fa1f-k8s-certs\") pod \"kube-apiserver-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal\" (UID: \"05f0ae08043c8b2b3508d2c518e1fa1f\") " pod="kube-system/kube-apiserver-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:04:54.409061 kubelet[1776]: I1213 02:04:54.408967 1776 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/6d2bcccb7f5a36790c2387ea66556f55-ca-certs\") pod \"kube-controller-manager-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal\" (UID: \"6d2bcccb7f5a36790c2387ea66556f55\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:04:54.409061 kubelet[1776]: I1213 02:04:54.409000 1776 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/6d2bcccb7f5a36790c2387ea66556f55-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal\" (UID: \"6d2bcccb7f5a36790c2387ea66556f55\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:04:54.409061 kubelet[1776]: I1213 02:04:54.409028 1776 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/6d2bcccb7f5a36790c2387ea66556f55-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal\" (UID: \"6d2bcccb7f5a36790c2387ea66556f55\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:04:54.409335 kubelet[1776]: I1213 02:04:54.409054 1776 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/6d2bcccb7f5a36790c2387ea66556f55-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal\" (UID: \"6d2bcccb7f5a36790c2387ea66556f55\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:04:54.409335 kubelet[1776]: I1213 02:04:54.409083 1776 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/05f0ae08043c8b2b3508d2c518e1fa1f-ca-certs\") pod \"kube-apiserver-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal\" (UID: \"05f0ae08043c8b2b3508d2c518e1fa1f\") " pod="kube-system/kube-apiserver-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:04:54.409335 kubelet[1776]: I1213 02:04:54.409236 1776 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/05f0ae08043c8b2b3508d2c518e1fa1f-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal\" (UID: \"05f0ae08043c8b2b3508d2c518e1fa1f\") " pod="kube-system/kube-apiserver-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:04:54.409335 kubelet[1776]: I1213 02:04:54.409289 1776 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/6d2bcccb7f5a36790c2387ea66556f55-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal\" (UID: \"6d2bcccb7f5a36790c2387ea66556f55\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:04:54.423232 kubelet[1776]: E1213 02:04:54.423156 1776 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.6:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.6:6443: connect: connection refused" interval="400ms" Dec 13 02:04:54.519932 kubelet[1776]: I1213 02:04:54.519874 1776 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:04:54.520490 kubelet[1776]: E1213 02:04:54.520326 1776 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.128.0.6:6443/api/v1/nodes\": dial tcp 10.128.0.6:6443: connect: connection refused" node="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:04:54.662835 env[1236]: time="2024-12-13T02:04:54.662391162Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal,Uid:05f0ae08043c8b2b3508d2c518e1fa1f,Namespace:kube-system,Attempt:0,}" Dec 13 02:04:54.676828 env[1236]: time="2024-12-13T02:04:54.676756837Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal,Uid:6d2bcccb7f5a36790c2387ea66556f55,Namespace:kube-system,Attempt:0,}" Dec 13 02:04:54.681292 env[1236]: time="2024-12-13T02:04:54.681230060Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal,Uid:761dbeec36cb8b8c786ab96d71362215,Namespace:kube-system,Attempt:0,}" Dec 13 02:04:54.824458 kubelet[1776]: E1213 02:04:54.824386 1776 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.6:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.6:6443: connect: connection refused" interval="800ms" Dec 13 02:04:54.944146 kubelet[1776]: I1213 02:04:54.943653 1776 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:04:54.944356 kubelet[1776]: E1213 02:04:54.944318 1776 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.128.0.6:6443/api/v1/nodes\": dial tcp 10.128.0.6:6443: connect: connection refused" node="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:04:55.065941 kubelet[1776]: W1213 02:04:55.065834 1776 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.128.0.6:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.6:6443: connect: connection refused Dec 13 02:04:55.065941 kubelet[1776]: E1213 02:04:55.065935 1776 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.6:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.6:6443: connect: connection refused Dec 13 02:04:55.108271 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2739886643.mount: Deactivated successfully. Dec 13 02:04:55.116774 env[1236]: time="2024-12-13T02:04:55.116713204Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:55.119935 env[1236]: time="2024-12-13T02:04:55.119864352Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:55.121834 env[1236]: time="2024-12-13T02:04:55.121777068Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:55.123069 env[1236]: time="2024-12-13T02:04:55.123022683Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:55.126785 env[1236]: time="2024-12-13T02:04:55.126729923Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:55.128058 env[1236]: time="2024-12-13T02:04:55.128004069Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:55.129194 env[1236]: time="2024-12-13T02:04:55.129156927Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:55.131446 env[1236]: time="2024-12-13T02:04:55.131396472Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:55.132570 env[1236]: time="2024-12-13T02:04:55.132521239Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:55.133563 env[1236]: time="2024-12-13T02:04:55.133525671Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:55.137146 env[1236]: time="2024-12-13T02:04:55.137089133Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:55.138782 env[1236]: time="2024-12-13T02:04:55.138734667Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:55.178775 kubelet[1776]: W1213 02:04:55.178287 1776 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.128.0.6:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.6:6443: connect: connection refused Dec 13 02:04:55.178775 kubelet[1776]: E1213 02:04:55.178379 1776 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.6:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.6:6443: connect: connection refused Dec 13 02:04:55.181467 env[1236]: time="2024-12-13T02:04:55.181359165Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:04:55.181467 env[1236]: time="2024-12-13T02:04:55.181419781Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:04:55.181467 env[1236]: time="2024-12-13T02:04:55.181440878Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:04:55.194021 env[1236]: time="2024-12-13T02:04:55.190265838Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d53d077680fd10fae932cfeae5bb8c6c8f00bb93e59f4b226bc8b6eeac5df437 pid=1813 runtime=io.containerd.runc.v2 Dec 13 02:04:55.197834 kubelet[1776]: W1213 02:04:55.197610 1776 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.128.0.6:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.6:6443: connect: connection refused Dec 13 02:04:55.197834 kubelet[1776]: E1213 02:04:55.197700 1776 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.6:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.6:6443: connect: connection refused Dec 13 02:04:55.207353 env[1236]: time="2024-12-13T02:04:55.206963264Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:04:55.207353 env[1236]: time="2024-12-13T02:04:55.207020105Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:04:55.207353 env[1236]: time="2024-12-13T02:04:55.207040935Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:04:55.207816 env[1236]: time="2024-12-13T02:04:55.207490694Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e071adede1fd3fe8e91cacc98aec232e8a03ddb4b7bd3a259f9d9c66363e8425 pid=1841 runtime=io.containerd.runc.v2 Dec 13 02:04:55.222234 systemd[1]: Started cri-containerd-d53d077680fd10fae932cfeae5bb8c6c8f00bb93e59f4b226bc8b6eeac5df437.scope. Dec 13 02:04:55.241142 env[1236]: time="2024-12-13T02:04:55.240981597Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:04:55.241352 env[1236]: time="2024-12-13T02:04:55.241183209Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:04:55.241352 env[1236]: time="2024-12-13T02:04:55.241268218Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:04:55.241732 env[1236]: time="2024-12-13T02:04:55.241637987Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5404434d4a99a9fed0e66c74b6b666834414745b73d6f5768233e05b67852fb1 pid=1846 runtime=io.containerd.runc.v2 Dec 13 02:04:55.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.268000 audit: BPF prog-id=61 op=LOAD Dec 13 02:04:55.269000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.269000 audit[1826]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1813 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:55.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435336430373736383066643130666165393332636665616535626238 Dec 13 02:04:55.269000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.269000 audit[1826]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1813 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:55.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435336430373736383066643130666165393332636665616535626238 Dec 13 02:04:55.269000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.269000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.269000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.269000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.269000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.269000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.269000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.269000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.269000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.269000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.269000 audit: BPF prog-id=62 op=LOAD Dec 13 02:04:55.269000 audit[1826]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000f9f80 items=0 ppid=1813 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:55.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435336430373736383066643130666165393332636665616535626238 Dec 13 02:04:55.269000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.269000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.269000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.269000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.269000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.269000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.269000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.269000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.269000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.269000 audit: BPF prog-id=63 op=LOAD Dec 13 02:04:55.269000 audit[1826]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000f9fc8 items=0 ppid=1813 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:55.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435336430373736383066643130666165393332636665616535626238 Dec 13 02:04:55.270000 audit: BPF prog-id=63 op=UNLOAD Dec 13 02:04:55.270000 audit: BPF prog-id=62 op=UNLOAD Dec 13 02:04:55.270000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.270000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.270000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.270000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.270000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.270000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.270000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.270000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.270000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.270000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.270000 audit: BPF prog-id=64 op=LOAD Dec 13 02:04:55.270000 audit[1826]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003723d8 items=0 ppid=1813 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:55.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435336430373736383066643130666165393332636665616535626238 Dec 13 02:04:55.287302 systemd[1]: Started cri-containerd-5404434d4a99a9fed0e66c74b6b666834414745b73d6f5768233e05b67852fb1.scope. Dec 13 02:04:55.293971 systemd[1]: Started cri-containerd-e071adede1fd3fe8e91cacc98aec232e8a03ddb4b7bd3a259f9d9c66363e8425.scope. Dec 13 02:04:55.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.332000 audit: BPF prog-id=65 op=LOAD Dec 13 02:04:55.335000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.335000 audit[1864]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1841 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:55.335000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530373161646564653166643366653865393163616363393861656332 Dec 13 02:04:55.339000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.339000 audit[1864]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1841 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:55.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530373161646564653166643366653865393163616363393861656332 Dec 13 02:04:55.340000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.340000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.340000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.340000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.340000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.340000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.340000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.340000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.340000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.340000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.340000 audit: BPF prog-id=66 op=LOAD Dec 13 02:04:55.340000 audit[1864]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000025050 items=0 ppid=1841 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:55.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530373161646564653166643366653865393163616363393861656332 Dec 13 02:04:55.341000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.341000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.341000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.341000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.341000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.341000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.341000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.341000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.341000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.341000 audit: BPF prog-id=67 op=LOAD Dec 13 02:04:55.341000 audit[1864]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000025098 items=0 ppid=1841 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:55.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530373161646564653166643366653865393163616363393861656332 Dec 13 02:04:55.342000 audit: BPF prog-id=67 op=UNLOAD Dec 13 02:04:55.342000 audit: BPF prog-id=66 op=UNLOAD Dec 13 02:04:55.342000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.342000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.342000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.342000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.342000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.342000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.342000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.342000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.342000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.342000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.342000 audit: BPF prog-id=68 op=LOAD Dec 13 02:04:55.342000 audit[1864]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000254a8 items=0 ppid=1841 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:55.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530373161646564653166643366653865393163616363393861656332 Dec 13 02:04:55.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.347000 audit: BPF prog-id=69 op=LOAD Dec 13 02:04:55.350000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.350000 audit[1880]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1846 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:55.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534303434333464346139396139666564306536366337346236623636 Dec 13 02:04:55.350000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.350000 audit[1880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1846 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:55.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534303434333464346139396139666564306536366337346236623636 Dec 13 02:04:55.351000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.351000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.351000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.351000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.351000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.351000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.351000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.351000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.351000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.351000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.351000 audit: BPF prog-id=70 op=LOAD Dec 13 02:04:55.351000 audit[1880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003f2c00 items=0 ppid=1846 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:55.351000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534303434333464346139396139666564306536366337346236623636 Dec 13 02:04:55.352000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.352000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.352000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.352000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.352000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.352000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.352000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.352000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.352000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.352000 audit: BPF prog-id=71 op=LOAD Dec 13 02:04:55.352000 audit[1880]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003f2c48 items=0 ppid=1846 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:55.352000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534303434333464346139396139666564306536366337346236623636 Dec 13 02:04:55.353000 audit: BPF prog-id=71 op=UNLOAD Dec 13 02:04:55.353000 audit: BPF prog-id=70 op=UNLOAD Dec 13 02:04:55.353000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.353000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.353000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.353000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.353000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.353000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.353000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.353000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.353000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.353000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.353000 audit: BPF prog-id=72 op=LOAD Dec 13 02:04:55.353000 audit[1880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003f3058 items=0 ppid=1846 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:55.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534303434333464346139396139666564306536366337346236623636 Dec 13 02:04:55.373587 env[1236]: time="2024-12-13T02:04:55.373520246Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal,Uid:6d2bcccb7f5a36790c2387ea66556f55,Namespace:kube-system,Attempt:0,} returns sandbox id \"d53d077680fd10fae932cfeae5bb8c6c8f00bb93e59f4b226bc8b6eeac5df437\"" Dec 13 02:04:55.380699 kubelet[1776]: E1213 02:04:55.380651 1776 kubelet_pods.go:513] "Hostname for pod was too long, truncated it" podName="kube-controller-manager-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-controller-manager-ci-3510-3-6-1953990c6081bf67a15e.c.flat" Dec 13 02:04:55.385892 env[1236]: time="2024-12-13T02:04:55.385831572Z" level=info msg="CreateContainer within sandbox \"d53d077680fd10fae932cfeae5bb8c6c8f00bb93e59f4b226bc8b6eeac5df437\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 02:04:55.417802 env[1236]: time="2024-12-13T02:04:55.417734289Z" level=info msg="CreateContainer within sandbox \"d53d077680fd10fae932cfeae5bb8c6c8f00bb93e59f4b226bc8b6eeac5df437\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"3802f1a8b80951b0ac0f5f9240a58e806d751c00418ec73b2b7dd7a5232197b2\"" Dec 13 02:04:55.418803 env[1236]: time="2024-12-13T02:04:55.418755480Z" level=info msg="StartContainer for \"3802f1a8b80951b0ac0f5f9240a58e806d751c00418ec73b2b7dd7a5232197b2\"" Dec 13 02:04:55.420512 env[1236]: time="2024-12-13T02:04:55.420466009Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal,Uid:761dbeec36cb8b8c786ab96d71362215,Namespace:kube-system,Attempt:0,} returns sandbox id \"5404434d4a99a9fed0e66c74b6b666834414745b73d6f5768233e05b67852fb1\"" Dec 13 02:04:55.427424 kubelet[1776]: E1213 02:04:55.427353 1776 kubelet_pods.go:513] "Hostname for pod was too long, truncated it" podName="kube-scheduler-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-scheduler-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-21291" Dec 13 02:04:55.429418 env[1236]: time="2024-12-13T02:04:55.429368110Z" level=info msg="CreateContainer within sandbox \"5404434d4a99a9fed0e66c74b6b666834414745b73d6f5768233e05b67852fb1\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 02:04:55.433931 env[1236]: time="2024-12-13T02:04:55.433849803Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal,Uid:05f0ae08043c8b2b3508d2c518e1fa1f,Namespace:kube-system,Attempt:0,} returns sandbox id \"e071adede1fd3fe8e91cacc98aec232e8a03ddb4b7bd3a259f9d9c66363e8425\"" Dec 13 02:04:55.437660 kubelet[1776]: E1213 02:04:55.437159 1776 kubelet_pods.go:513] "Hostname for pod was too long, truncated it" podName="kube-apiserver-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-apiserver-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-21291" Dec 13 02:04:55.440242 env[1236]: time="2024-12-13T02:04:55.440129280Z" level=info msg="CreateContainer within sandbox \"e071adede1fd3fe8e91cacc98aec232e8a03ddb4b7bd3a259f9d9c66363e8425\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 02:04:55.444301 kubelet[1776]: W1213 02:04:55.444224 1776 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.128.0.6:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.6:6443: connect: connection refused Dec 13 02:04:55.444301 kubelet[1776]: E1213 02:04:55.444310 1776 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.6:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.6:6443: connect: connection refused Dec 13 02:04:55.461304 systemd[1]: Started cri-containerd-3802f1a8b80951b0ac0f5f9240a58e806d751c00418ec73b2b7dd7a5232197b2.scope. Dec 13 02:04:55.466403 env[1236]: time="2024-12-13T02:04:55.466352962Z" level=info msg="CreateContainer within sandbox \"5404434d4a99a9fed0e66c74b6b666834414745b73d6f5768233e05b67852fb1\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"8932816b92b16c2783059fc2b10c52e73a12934e67a981dd72e06769941555eb\"" Dec 13 02:04:55.467702 env[1236]: time="2024-12-13T02:04:55.467663143Z" level=info msg="StartContainer for \"8932816b92b16c2783059fc2b10c52e73a12934e67a981dd72e06769941555eb\"" Dec 13 02:04:55.476940 env[1236]: time="2024-12-13T02:04:55.476883324Z" level=info msg="CreateContainer within sandbox \"e071adede1fd3fe8e91cacc98aec232e8a03ddb4b7bd3a259f9d9c66363e8425\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"d347fda21803e79c2b2011201ae7254da60d1c329452e53f3e818c33f1378370\"" Dec 13 02:04:55.477979 env[1236]: time="2024-12-13T02:04:55.477936987Z" level=info msg="StartContainer for \"d347fda21803e79c2b2011201ae7254da60d1c329452e53f3e818c33f1378370\"" Dec 13 02:04:55.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.496000 audit: BPF prog-id=73 op=LOAD Dec 13 02:04:55.497000 audit[1944]: AVC avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.497000 audit[1944]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1813 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:55.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338303266316138623830393531623061633066356639323430613538 Dec 13 02:04:55.497000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.497000 audit[1944]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1813 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:55.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338303266316138623830393531623061633066356639323430613538 Dec 13 02:04:55.497000 audit[1944]: AVC avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.497000 audit[1944]: AVC avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.497000 audit[1944]: AVC avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.497000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.497000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.497000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.497000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.497000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.497000 audit[1944]: AVC avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.497000 audit[1944]: AVC avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.497000 audit: BPF prog-id=74 op=LOAD Dec 13 02:04:55.497000 audit[1944]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000370860 items=0 ppid=1813 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:55.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338303266316138623830393531623061633066356639323430613538 Dec 13 02:04:55.497000 audit[1944]: AVC avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.497000 audit[1944]: AVC avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.497000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.497000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.497000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.497000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.497000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.497000 audit[1944]: AVC avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.497000 audit[1944]: AVC avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.497000 audit: BPF prog-id=75 op=LOAD Dec 13 02:04:55.497000 audit[1944]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003708a8 items=0 ppid=1813 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:55.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338303266316138623830393531623061633066356639323430613538 Dec 13 02:04:55.498000 audit: BPF prog-id=75 op=UNLOAD Dec 13 02:04:55.498000 audit: BPF prog-id=74 op=UNLOAD Dec 13 02:04:55.498000 audit[1944]: AVC avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.498000 audit[1944]: AVC avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.498000 audit[1944]: AVC avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.498000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.498000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.498000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.498000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.498000 audit[1944]: AVC avc: denied { perfmon } for pid=1944 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.498000 audit[1944]: AVC avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.498000 audit[1944]: AVC avc: denied { bpf } for pid=1944 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.498000 audit: BPF prog-id=76 op=LOAD Dec 13 02:04:55.498000 audit[1944]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000370cb8 items=0 ppid=1813 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:55.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338303266316138623830393531623061633066356639323430613538 Dec 13 02:04:55.520845 systemd[1]: Started cri-containerd-8932816b92b16c2783059fc2b10c52e73a12934e67a981dd72e06769941555eb.scope. Dec 13 02:04:55.541976 systemd[1]: Started cri-containerd-d347fda21803e79c2b2011201ae7254da60d1c329452e53f3e818c33f1378370.scope. Dec 13 02:04:55.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.567000 audit: BPF prog-id=77 op=LOAD Dec 13 02:04:55.568000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.568000 audit[1975]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1846 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:55.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839333238313662393262313663323738333035396663326231306335 Dec 13 02:04:55.568000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.568000 audit[1975]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1846 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:55.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839333238313662393262313663323738333035396663326231306335 Dec 13 02:04:55.568000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.568000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.568000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.568000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.568000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.568000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.568000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.568000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.568000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.568000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.568000 audit: BPF prog-id=78 op=LOAD Dec 13 02:04:55.568000 audit[1975]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003eae60 items=0 ppid=1846 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:55.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839333238313662393262313663323738333035396663326231306335 Dec 13 02:04:55.570000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.570000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.570000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.570000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.570000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.570000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.570000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.570000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.570000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.570000 audit: BPF prog-id=79 op=LOAD Dec 13 02:04:55.570000 audit[1975]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003eaea8 items=0 ppid=1846 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:55.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839333238313662393262313663323738333035396663326231306335 Dec 13 02:04:55.576000 audit: BPF prog-id=79 op=UNLOAD Dec 13 02:04:55.576000 audit: BPF prog-id=78 op=UNLOAD Dec 13 02:04:55.577000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.577000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.577000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.577000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.577000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.577000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.577000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.577000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.577000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.577000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.577000 audit: BPF prog-id=80 op=LOAD Dec 13 02:04:55.577000 audit[1975]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003eb2b8 items=0 ppid=1846 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:55.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839333238313662393262313663323738333035396663326231306335 Dec 13 02:04:55.584177 env[1236]: time="2024-12-13T02:04:55.584125839Z" level=info msg="StartContainer for \"3802f1a8b80951b0ac0f5f9240a58e806d751c00418ec73b2b7dd7a5232197b2\" returns successfully" Dec 13 02:04:55.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.593000 audit: BPF prog-id=81 op=LOAD Dec 13 02:04:55.594000 audit[1987]: AVC avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.594000 audit[1987]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1841 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:55.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433343766646132313830336537396332623230313132303161653732 Dec 13 02:04:55.594000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.594000 audit[1987]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1841 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:55.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433343766646132313830336537396332623230313132303161653732 Dec 13 02:04:55.594000 audit[1987]: AVC avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.594000 audit[1987]: AVC avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.594000 audit[1987]: AVC avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.594000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.594000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.594000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.594000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.594000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.594000 audit[1987]: AVC avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.594000 audit[1987]: AVC avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.594000 audit: BPF prog-id=82 op=LOAD Dec 13 02:04:55.594000 audit[1987]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001be220 items=0 ppid=1841 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:55.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433343766646132313830336537396332623230313132303161653732 Dec 13 02:04:55.594000 audit[1987]: AVC avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.594000 audit[1987]: AVC avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.594000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.594000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.594000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.594000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.594000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.594000 audit[1987]: AVC avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.594000 audit[1987]: AVC avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.594000 audit: BPF prog-id=83 op=LOAD Dec 13 02:04:55.594000 audit[1987]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001be268 items=0 ppid=1841 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:55.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433343766646132313830336537396332623230313132303161653732 Dec 13 02:04:55.595000 audit: BPF prog-id=83 op=UNLOAD Dec 13 02:04:55.595000 audit: BPF prog-id=82 op=UNLOAD Dec 13 02:04:55.595000 audit[1987]: AVC avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.595000 audit[1987]: AVC avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.595000 audit[1987]: AVC avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.595000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.595000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.595000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.595000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.595000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.595000 audit[1987]: AVC avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.595000 audit[1987]: AVC avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:55.595000 audit: BPF prog-id=84 op=LOAD Dec 13 02:04:55.595000 audit[1987]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001be678 items=0 ppid=1841 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:55.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433343766646132313830336537396332623230313132303161653732 Dec 13 02:04:55.625531 kubelet[1776]: E1213 02:04:55.625463 1776 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.6:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.6:6443: connect: connection refused" interval="1.6s" Dec 13 02:04:55.654196 env[1236]: time="2024-12-13T02:04:55.654131728Z" level=info msg="StartContainer for \"d347fda21803e79c2b2011201ae7254da60d1c329452e53f3e818c33f1378370\" returns successfully" Dec 13 02:04:55.720682 env[1236]: time="2024-12-13T02:04:55.720535492Z" level=info msg="StartContainer for \"8932816b92b16c2783059fc2b10c52e73a12934e67a981dd72e06769941555eb\" returns successfully" Dec 13 02:04:55.752769 kubelet[1776]: I1213 02:04:55.752726 1776 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:04:55.753298 kubelet[1776]: E1213 02:04:55.753180 1776 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.128.0.6:6443/api/v1/nodes\": dial tcp 10.128.0.6:6443: connect: connection refused" node="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:04:57.360824 kubelet[1776]: I1213 02:04:57.360785 1776 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:04:57.945028 kernel: kauditd_printk_skb: 562 callbacks suppressed Dec 13 02:04:57.945253 kernel: audit: type=1400 audit(1734055497.911:546): avc: denied { watch } for pid=1969 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c681,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:04:57.911000 audit[1969]: AVC avc: denied { watch } for pid=1969 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c681,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:04:57.911000 audit[1969]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0007641b0 a2=fc6 a3=0 items=0 ppid=1813 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c681,c864 key=(null) Dec 13 02:04:58.021400 kernel: audit: type=1300 audit(1734055497.911:546): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0007641b0 a2=fc6 a3=0 items=0 ppid=1813 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c681,c864 key=(null) Dec 13 02:04:58.021539 kernel: audit: type=1327 audit(1734055497.911:546): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:04:57.911000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:04:58.047471 kernel: audit: type=1400 audit(1734055497.945:547): avc: denied { watch } for pid=1969 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520982 scontext=system_u:system_r:svirt_lxc_net_t:s0:c681,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:04:57.945000 audit[1969]: AVC avc: denied { watch } for pid=1969 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520982 scontext=system_u:system_r:svirt_lxc_net_t:s0:c681,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:04:58.082083 kernel: audit: type=1300 audit(1734055497.945:547): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000151e60 a2=fc6 a3=0 items=0 ppid=1813 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c681,c864 key=(null) Dec 13 02:04:57.945000 audit[1969]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000151e60 a2=fc6 a3=0 items=0 ppid=1813 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c681,c864 key=(null) Dec 13 02:04:57.945000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:04:58.111277 kernel: audit: type=1327 audit(1734055497.945:547): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:04:58.017000 audit[2014]: AVC avc: denied { watch } for pid=2014 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c86,c871 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:04:58.143369 kernel: audit: type=1400 audit(1734055498.017:548): avc: denied { watch } for pid=2014 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c86,c871 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:04:58.017000 audit[2014]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0046fa990 a2=fc6 a3=0 items=0 ppid=1841 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c86,c871 key=(null) Dec 13 02:04:58.206394 kernel: audit: type=1300 audit(1734055498.017:548): arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0046fa990 a2=fc6 a3=0 items=0 ppid=1841 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c86,c871 key=(null) Dec 13 02:04:58.206582 kernel: audit: type=1327 audit(1734055498.017:548): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E36002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 02:04:58.017000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E36002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 02:04:58.020000 audit[2014]: AVC avc: denied { watch } for pid=2014 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c86,c871 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:04:58.020000 audit[2014]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0046faa20 a2=fc6 a3=0 items=0 ppid=1841 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c86,c871 key=(null) Dec 13 02:04:58.235307 kernel: audit: type=1400 audit(1734055498.020:549): avc: denied { watch } for pid=2014 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c86,c871 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:04:58.020000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E36002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 02:04:58.111000 audit[2014]: AVC avc: denied { watch } for pid=2014 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520990 scontext=system_u:system_r:svirt_lxc_net_t:s0:c86,c871 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:04:58.111000 audit[2014]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4c a1=c0046fbb00 a2=fc6 a3=0 items=0 ppid=1841 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c86,c871 key=(null) Dec 13 02:04:58.111000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E36002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 02:04:58.113000 audit[2014]: AVC avc: denied { watch } for pid=2014 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520982 scontext=system_u:system_r:svirt_lxc_net_t:s0:c86,c871 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:04:58.113000 audit[2014]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4c a1=c007fc2e00 a2=fc6 a3=0 items=0 ppid=1841 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c86,c871 key=(null) Dec 13 02:04:58.113000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E36002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 02:04:58.176000 audit[2014]: AVC avc: denied { watch } for pid=2014 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520982 scontext=system_u:system_r:svirt_lxc_net_t:s0:c86,c871 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:04:58.176000 audit[2014]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c006991dc0 a2=fc6 a3=0 items=0 ppid=1841 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c86,c871 key=(null) Dec 13 02:04:58.176000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E36002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 02:04:58.176000 audit[2014]: AVC avc: denied { watch } for pid=2014 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c86,c871 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:04:58.176000 audit[2014]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c0043d0270 a2=fc6 a3=0 items=0 ppid=1841 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c86,c871 key=(null) Dec 13 02:04:58.176000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E36002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 02:04:58.410711 kubelet[1776]: E1213 02:04:58.410637 1776 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal\" not found" node="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:04:58.437954 kubelet[1776]: I1213 02:04:58.437918 1776 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:04:59.166678 kubelet[1776]: I1213 02:04:59.166610 1776 apiserver.go:52] "Watching apiserver" Dec 13 02:04:59.208735 kubelet[1776]: I1213 02:04:59.208689 1776 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 02:04:59.889507 kubelet[1776]: W1213 02:04:59.889462 1776 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Dec 13 02:05:00.359809 systemd[1]: Reloading. Dec 13 02:05:00.482305 /usr/lib/systemd/system-generators/torcx-generator[2072]: time="2024-12-13T02:05:00Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:05:00.491233 /usr/lib/systemd/system-generators/torcx-generator[2072]: time="2024-12-13T02:05:00Z" level=info msg="torcx already run" Dec 13 02:05:00.628292 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:05:00.628323 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:05:00.655042 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:05:00.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.771000 audit: BPF prog-id=85 op=LOAD Dec 13 02:05:00.771000 audit: BPF prog-id=65 op=UNLOAD Dec 13 02:05:00.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.772000 audit: BPF prog-id=86 op=LOAD Dec 13 02:05:00.772000 audit: BPF prog-id=46 op=UNLOAD Dec 13 02:05:00.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.772000 audit: BPF prog-id=87 op=LOAD Dec 13 02:05:00.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.773000 audit: BPF prog-id=88 op=LOAD Dec 13 02:05:00.773000 audit: BPF prog-id=47 op=UNLOAD Dec 13 02:05:00.773000 audit: BPF prog-id=48 op=UNLOAD Dec 13 02:05:00.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.774000 audit: BPF prog-id=89 op=LOAD Dec 13 02:05:00.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.774000 audit: BPF prog-id=90 op=LOAD Dec 13 02:05:00.774000 audit: BPF prog-id=49 op=UNLOAD Dec 13 02:05:00.774000 audit: BPF prog-id=50 op=UNLOAD Dec 13 02:05:00.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.775000 audit: BPF prog-id=91 op=LOAD Dec 13 02:05:00.775000 audit: BPF prog-id=51 op=UNLOAD Dec 13 02:05:00.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.781000 audit: BPF prog-id=92 op=LOAD Dec 13 02:05:00.781000 audit: BPF prog-id=52 op=UNLOAD Dec 13 02:05:00.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.782000 audit: BPF prog-id=93 op=LOAD Dec 13 02:05:00.782000 audit: BPF prog-id=73 op=UNLOAD Dec 13 02:05:00.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.787000 audit: BPF prog-id=94 op=LOAD Dec 13 02:05:00.787000 audit: BPF prog-id=81 op=UNLOAD Dec 13 02:05:00.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.788000 audit: BPF prog-id=95 op=LOAD Dec 13 02:05:00.788000 audit: BPF prog-id=77 op=UNLOAD Dec 13 02:05:00.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.790000 audit: BPF prog-id=96 op=LOAD Dec 13 02:05:00.790000 audit: BPF prog-id=61 op=UNLOAD Dec 13 02:05:00.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.792000 audit: BPF prog-id=97 op=LOAD Dec 13 02:05:00.792000 audit: BPF prog-id=53 op=UNLOAD Dec 13 02:05:00.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.795000 audit: BPF prog-id=98 op=LOAD Dec 13 02:05:00.795000 audit: BPF prog-id=54 op=UNLOAD Dec 13 02:05:00.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.795000 audit: BPF prog-id=99 op=LOAD Dec 13 02:05:00.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.795000 audit: BPF prog-id=100 op=LOAD Dec 13 02:05:00.795000 audit: BPF prog-id=55 op=UNLOAD Dec 13 02:05:00.795000 audit: BPF prog-id=56 op=UNLOAD Dec 13 02:05:00.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.797000 audit: BPF prog-id=101 op=LOAD Dec 13 02:05:00.797000 audit: BPF prog-id=57 op=UNLOAD Dec 13 02:05:00.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.798000 audit: BPF prog-id=102 op=LOAD Dec 13 02:05:00.798000 audit: BPF prog-id=69 op=UNLOAD Dec 13 02:05:00.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.801000 audit: BPF prog-id=103 op=LOAD Dec 13 02:05:00.801000 audit: BPF prog-id=58 op=UNLOAD Dec 13 02:05:00.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.801000 audit: BPF prog-id=104 op=LOAD Dec 13 02:05:00.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.802000 audit: BPF prog-id=105 op=LOAD Dec 13 02:05:00.802000 audit: BPF prog-id=59 op=UNLOAD Dec 13 02:05:00.802000 audit: BPF prog-id=60 op=UNLOAD Dec 13 02:05:00.828267 systemd[1]: Stopping kubelet.service... Dec 13 02:05:00.829611 kubelet[1776]: E1213 02:05:00.828045 1776 event.go:319] "Unable to write event (broadcaster is shut down)" event="&Event{ObjectMeta:{ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal.18109a48d77b2cc8 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal,UID:ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal,},FirstTimestamp:2024-12-13 02:04:54.181137608 +0000 UTC m=+0.787752098,LastTimestamp:2024-12-13 02:04:54.181137608 +0000 UTC m=+0.787752098,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal,}" Dec 13 02:05:00.829611 kubelet[1776]: I1213 02:05:00.829197 1776 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 02:05:00.850754 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 02:05:00.851040 systemd[1]: Stopped kubelet.service. Dec 13 02:05:00.851165 systemd[1]: kubelet.service: Consumed 1.255s CPU time. Dec 13 02:05:00.850000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:00.853982 systemd[1]: Starting kubelet.service... Dec 13 02:05:01.079201 systemd[1]: Started kubelet.service. Dec 13 02:05:01.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:01.172785 kubelet[2120]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:05:01.173186 kubelet[2120]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 02:05:01.173186 kubelet[2120]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:05:01.173338 kubelet[2120]: I1213 02:05:01.173292 2120 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 02:05:01.179657 kubelet[2120]: I1213 02:05:01.179619 2120 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 02:05:01.179820 kubelet[2120]: I1213 02:05:01.179674 2120 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 02:05:01.180005 kubelet[2120]: I1213 02:05:01.179969 2120 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 02:05:01.181585 kubelet[2120]: I1213 02:05:01.181537 2120 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 02:05:01.183026 kubelet[2120]: I1213 02:05:01.182989 2120 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 02:05:01.193988 kubelet[2120]: I1213 02:05:01.193937 2120 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 02:05:01.194354 kubelet[2120]: I1213 02:05:01.194268 2120 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 02:05:01.194551 kubelet[2120]: I1213 02:05:01.194312 2120 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 02:05:01.194747 kubelet[2120]: I1213 02:05:01.194572 2120 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 02:05:01.194747 kubelet[2120]: I1213 02:05:01.194590 2120 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 02:05:01.194747 kubelet[2120]: I1213 02:05:01.194652 2120 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:05:01.194933 kubelet[2120]: I1213 02:05:01.194781 2120 kubelet.go:400] "Attempting to sync node with API server" Dec 13 02:05:01.194933 kubelet[2120]: I1213 02:05:01.194799 2120 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 02:05:01.194933 kubelet[2120]: I1213 02:05:01.194830 2120 kubelet.go:312] "Adding apiserver pod source" Dec 13 02:05:01.194933 kubelet[2120]: I1213 02:05:01.194845 2120 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 02:05:01.206000 audit[2120]: AVC avc: denied { mac_admin } for pid=2120 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.206000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:05:01.206000 audit[2120]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000972360 a1=c000922468 a2=c000972330 a3=25 items=0 ppid=1 pid=2120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:01.206000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:05:01.206000 audit[2120]: AVC avc: denied { mac_admin } for pid=2120 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.206000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:05:01.206000 audit[2120]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000840460 a1=c000922480 a2=c0009723f0 a3=25 items=0 ppid=1 pid=2120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:01.206000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:05:01.207837 kubelet[2120]: I1213 02:05:01.203090 2120 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 02:05:01.207837 kubelet[2120]: I1213 02:05:01.203347 2120 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 02:05:01.207837 kubelet[2120]: I1213 02:05:01.203882 2120 server.go:1264] "Started kubelet" Dec 13 02:05:01.207837 kubelet[2120]: I1213 02:05:01.206359 2120 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 02:05:01.207837 kubelet[2120]: I1213 02:05:01.206439 2120 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 02:05:01.207837 kubelet[2120]: I1213 02:05:01.206478 2120 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 02:05:01.216267 kubelet[2120]: I1213 02:05:01.215009 2120 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 02:05:01.222030 kubelet[2120]: I1213 02:05:01.219029 2120 server.go:455] "Adding debug handlers to kubelet server" Dec 13 02:05:01.222030 kubelet[2120]: I1213 02:05:01.220427 2120 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 02:05:01.222030 kubelet[2120]: I1213 02:05:01.220689 2120 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 02:05:01.223563 kubelet[2120]: I1213 02:05:01.223528 2120 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 02:05:01.231328 kubelet[2120]: I1213 02:05:01.231294 2120 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 02:05:01.231527 kubelet[2120]: I1213 02:05:01.231509 2120 reconciler.go:26] "Reconciler: start to sync state" Dec 13 02:05:01.241428 kubelet[2120]: I1213 02:05:01.240009 2120 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 02:05:01.241983 kubelet[2120]: I1213 02:05:01.241950 2120 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 02:05:01.241983 kubelet[2120]: I1213 02:05:01.241986 2120 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 02:05:01.242187 kubelet[2120]: I1213 02:05:01.242008 2120 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 02:05:01.242187 kubelet[2120]: E1213 02:05:01.242072 2120 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 02:05:01.242523 kubelet[2120]: I1213 02:05:01.242501 2120 factory.go:221] Registration of the systemd container factory successfully Dec 13 02:05:01.242733 kubelet[2120]: I1213 02:05:01.242705 2120 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 02:05:01.252505 kubelet[2120]: E1213 02:05:01.252465 2120 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 02:05:01.252886 kubelet[2120]: I1213 02:05:01.252850 2120 factory.go:221] Registration of the containerd container factory successfully Dec 13 02:05:01.307592 kubelet[2120]: I1213 02:05:01.307548 2120 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 02:05:01.307592 kubelet[2120]: I1213 02:05:01.307570 2120 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 02:05:01.307592 kubelet[2120]: I1213 02:05:01.307596 2120 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:05:01.307893 kubelet[2120]: I1213 02:05:01.307872 2120 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 02:05:01.307951 kubelet[2120]: I1213 02:05:01.307888 2120 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 02:05:01.307951 kubelet[2120]: I1213 02:05:01.307917 2120 policy_none.go:49] "None policy: Start" Dec 13 02:05:01.308871 kubelet[2120]: I1213 02:05:01.308833 2120 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 02:05:01.308871 kubelet[2120]: I1213 02:05:01.308865 2120 state_mem.go:35] "Initializing new in-memory state store" Dec 13 02:05:01.309213 kubelet[2120]: I1213 02:05:01.309194 2120 state_mem.go:75] "Updated machine memory state" Dec 13 02:05:01.315030 kubelet[2120]: I1213 02:05:01.315000 2120 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 02:05:01.314000 audit[2120]: AVC avc: denied { mac_admin } for pid=2120 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.314000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:05:01.314000 audit[2120]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cf7860 a1=c000ff7278 a2=c000cf7830 a3=25 items=0 ppid=1 pid=2120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:01.314000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:05:01.315526 kubelet[2120]: I1213 02:05:01.315128 2120 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 02:05:01.315526 kubelet[2120]: I1213 02:05:01.315324 2120 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 02:05:01.315526 kubelet[2120]: I1213 02:05:01.315452 2120 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 02:05:01.345216 kubelet[2120]: I1213 02:05:01.342217 2120 topology_manager.go:215] "Topology Admit Handler" podUID="05f0ae08043c8b2b3508d2c518e1fa1f" podNamespace="kube-system" podName="kube-apiserver-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:01.353153 kubelet[2120]: I1213 02:05:01.347853 2120 topology_manager.go:215] "Topology Admit Handler" podUID="6d2bcccb7f5a36790c2387ea66556f55" podNamespace="kube-system" podName="kube-controller-manager-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:01.353153 kubelet[2120]: I1213 02:05:01.347967 2120 topology_manager.go:215] "Topology Admit Handler" podUID="761dbeec36cb8b8c786ab96d71362215" podNamespace="kube-system" podName="kube-scheduler-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:01.353153 kubelet[2120]: I1213 02:05:01.345727 2120 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:01.360331 kubelet[2120]: W1213 02:05:01.360296 2120 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Dec 13 02:05:01.362912 kubelet[2120]: W1213 02:05:01.362882 2120 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Dec 13 02:05:01.363249 kubelet[2120]: E1213 02:05:01.363205 2120 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal\" already exists" pod="kube-system/kube-controller-manager-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:01.363745 kubelet[2120]: W1213 02:05:01.363725 2120 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Dec 13 02:05:01.365692 kubelet[2120]: I1213 02:05:01.365667 2120 kubelet_node_status.go:112] "Node was previously registered" node="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:01.365967 kubelet[2120]: I1213 02:05:01.365949 2120 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:01.433377 kubelet[2120]: I1213 02:05:01.433314 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/05f0ae08043c8b2b3508d2c518e1fa1f-ca-certs\") pod \"kube-apiserver-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal\" (UID: \"05f0ae08043c8b2b3508d2c518e1fa1f\") " pod="kube-system/kube-apiserver-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:01.433377 kubelet[2120]: I1213 02:05:01.433375 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/6d2bcccb7f5a36790c2387ea66556f55-ca-certs\") pod \"kube-controller-manager-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal\" (UID: \"6d2bcccb7f5a36790c2387ea66556f55\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:01.433689 kubelet[2120]: I1213 02:05:01.433407 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/6d2bcccb7f5a36790c2387ea66556f55-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal\" (UID: \"6d2bcccb7f5a36790c2387ea66556f55\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:01.433689 kubelet[2120]: I1213 02:05:01.433447 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/6d2bcccb7f5a36790c2387ea66556f55-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal\" (UID: \"6d2bcccb7f5a36790c2387ea66556f55\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:01.433689 kubelet[2120]: I1213 02:05:01.433474 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/761dbeec36cb8b8c786ab96d71362215-kubeconfig\") pod \"kube-scheduler-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal\" (UID: \"761dbeec36cb8b8c786ab96d71362215\") " pod="kube-system/kube-scheduler-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:01.433689 kubelet[2120]: I1213 02:05:01.433500 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/05f0ae08043c8b2b3508d2c518e1fa1f-k8s-certs\") pod \"kube-apiserver-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal\" (UID: \"05f0ae08043c8b2b3508d2c518e1fa1f\") " pod="kube-system/kube-apiserver-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:01.433893 kubelet[2120]: I1213 02:05:01.433528 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/05f0ae08043c8b2b3508d2c518e1fa1f-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal\" (UID: \"05f0ae08043c8b2b3508d2c518e1fa1f\") " pod="kube-system/kube-apiserver-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:01.433893 kubelet[2120]: I1213 02:05:01.433557 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/6d2bcccb7f5a36790c2387ea66556f55-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal\" (UID: \"6d2bcccb7f5a36790c2387ea66556f55\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:01.433893 kubelet[2120]: I1213 02:05:01.433584 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/6d2bcccb7f5a36790c2387ea66556f55-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal\" (UID: \"6d2bcccb7f5a36790c2387ea66556f55\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:01.667000 audit[1969]: AVC avc: denied { watch } for pid=1969 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520982 scontext=system_u:system_r:svirt_lxc_net_t:s0:c681,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:05:01.667000 audit[1969]: AVC avc: denied { watch } for pid=1969 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520982 scontext=system_u:system_r:svirt_lxc_net_t:s0:c681,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:05:01.667000 audit[1969]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000da35e0 a2=fc6 a3=0 items=0 ppid=1813 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c681,c864 key=(null) Dec 13 02:05:01.667000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:05:01.668000 audit[1969]: AVC avc: denied { watch } for pid=1969 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520982 scontext=system_u:system_r:svirt_lxc_net_t:s0:c681,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:05:01.668000 audit[1969]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000da3600 a2=fc6 a3=0 items=0 ppid=1813 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c681,c864 key=(null) Dec 13 02:05:01.668000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:05:01.669000 audit[1969]: AVC avc: denied { watch } for pid=1969 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520982 scontext=system_u:system_r:svirt_lxc_net_t:s0:c681,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:05:01.669000 audit[1969]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000da37a0 a2=fc6 a3=0 items=0 ppid=1813 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c681,c864 key=(null) Dec 13 02:05:01.669000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:05:01.667000 audit[1969]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000da35c0 a2=fc6 a3=0 items=0 ppid=1813 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c681,c864 key=(null) Dec 13 02:05:01.667000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:05:02.202648 kubelet[2120]: I1213 02:05:02.202596 2120 apiserver.go:52] "Watching apiserver" Dec 13 02:05:02.231890 kubelet[2120]: I1213 02:05:02.231813 2120 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 02:05:02.313512 kubelet[2120]: I1213 02:05:02.313436 2120 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" podStartSLOduration=1.313412773 podStartE2EDuration="1.313412773s" podCreationTimestamp="2024-12-13 02:05:01 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:05:02.304694538 +0000 UTC m=+1.215246187" watchObservedRunningTime="2024-12-13 02:05:02.313412773 +0000 UTC m=+1.223964418" Dec 13 02:05:02.323879 kubelet[2120]: I1213 02:05:02.323805 2120 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" podStartSLOduration=1.323760085 podStartE2EDuration="1.323760085s" podCreationTimestamp="2024-12-13 02:05:01 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:05:02.313655859 +0000 UTC m=+1.224207506" watchObservedRunningTime="2024-12-13 02:05:02.323760085 +0000 UTC m=+1.234311722" Dec 13 02:05:02.343389 kubelet[2120]: I1213 02:05:02.343326 2120 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" podStartSLOduration=3.343304502 podStartE2EDuration="3.343304502s" podCreationTimestamp="2024-12-13 02:04:59 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:05:02.324444422 +0000 UTC m=+1.234996071" watchObservedRunningTime="2024-12-13 02:05:02.343304502 +0000 UTC m=+1.253856148" Dec 13 02:05:04.820229 update_engine[1223]: I1213 02:05:04.820173 1223 update_attempter.cc:509] Updating boot flags... Dec 13 02:05:07.439065 sudo[1455]: pam_unix(sudo:session): session closed for user root Dec 13 02:05:07.438000 audit[1455]: USER_END pid=1455 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:05:07.444676 kernel: kauditd_printk_skb: 284 callbacks suppressed Dec 13 02:05:07.444844 kernel: audit: type=1106 audit(1734055507.438:807): pid=1455 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:05:07.472150 kernel: audit: type=1104 audit(1734055507.440:808): pid=1455 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:05:07.440000 audit[1455]: CRED_DISP pid=1455 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:05:07.489511 sshd[1442]: pam_unix(sshd:session): session closed for user core Dec 13 02:05:07.489000 audit[1442]: USER_END pid=1442 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:05:07.495820 systemd-logind[1221]: Session 7 logged out. Waiting for processes to exit. Dec 13 02:05:07.498682 systemd[1]: sshd@6-10.128.0.6:22-139.178.68.195:36210.service: Deactivated successfully. Dec 13 02:05:07.499819 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 02:05:07.500015 systemd[1]: session-7.scope: Consumed 5.634s CPU time. Dec 13 02:05:07.502638 systemd-logind[1221]: Removed session 7. Dec 13 02:05:07.489000 audit[1442]: CRED_DISP pid=1442 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:05:07.549795 kernel: audit: type=1106 audit(1734055507.489:809): pid=1442 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:05:07.550010 kernel: audit: type=1104 audit(1734055507.489:810): pid=1442 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:05:07.550058 kernel: audit: type=1131 audit(1734055507.498:811): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.6:22-139.178.68.195:36210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:07.498000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.6:22-139.178.68.195:36210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:12.747000 audit[1969]: AVC avc: denied { watch } for pid=1969 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521015 scontext=system_u:system_r:svirt_lxc_net_t:s0:c681,c864 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 02:05:12.747000 audit[1969]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001076d80 a2=fc6 a3=0 items=0 ppid=1813 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c681,c864 key=(null) Dec 13 02:05:12.811155 kernel: audit: type=1400 audit(1734055512.747:812): avc: denied { watch } for pid=1969 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521015 scontext=system_u:system_r:svirt_lxc_net_t:s0:c681,c864 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 02:05:12.811340 kernel: audit: type=1300 audit(1734055512.747:812): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001076d80 a2=fc6 a3=0 items=0 ppid=1813 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c681,c864 key=(null) Dec 13 02:05:12.811393 kernel: audit: type=1327 audit(1734055512.747:812): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:05:12.747000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:05:15.508675 kubelet[2120]: I1213 02:05:15.508628 2120 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 02:05:15.510213 env[1236]: time="2024-12-13T02:05:15.510155844Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 02:05:15.511018 kubelet[2120]: I1213 02:05:15.510987 2120 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 02:05:16.374882 kubelet[2120]: I1213 02:05:16.374828 2120 topology_manager.go:215] "Topology Admit Handler" podUID="f63c7488-56ce-4c1c-af60-fb3eac8f7712" podNamespace="kube-system" podName="kube-proxy-hnhmw" Dec 13 02:05:16.385195 systemd[1]: Created slice kubepods-besteffort-podf63c7488_56ce_4c1c_af60_fb3eac8f7712.slice. Dec 13 02:05:16.536394 kubelet[2120]: I1213 02:05:16.536328 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/f63c7488-56ce-4c1c-af60-fb3eac8f7712-kube-proxy\") pod \"kube-proxy-hnhmw\" (UID: \"f63c7488-56ce-4c1c-af60-fb3eac8f7712\") " pod="kube-system/kube-proxy-hnhmw" Dec 13 02:05:16.536394 kubelet[2120]: I1213 02:05:16.536384 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/f63c7488-56ce-4c1c-af60-fb3eac8f7712-lib-modules\") pod \"kube-proxy-hnhmw\" (UID: \"f63c7488-56ce-4c1c-af60-fb3eac8f7712\") " pod="kube-system/kube-proxy-hnhmw" Dec 13 02:05:16.536950 kubelet[2120]: I1213 02:05:16.536418 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-98k2z\" (UniqueName: \"kubernetes.io/projected/f63c7488-56ce-4c1c-af60-fb3eac8f7712-kube-api-access-98k2z\") pod \"kube-proxy-hnhmw\" (UID: \"f63c7488-56ce-4c1c-af60-fb3eac8f7712\") " pod="kube-system/kube-proxy-hnhmw" Dec 13 02:05:16.536950 kubelet[2120]: I1213 02:05:16.536446 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/f63c7488-56ce-4c1c-af60-fb3eac8f7712-xtables-lock\") pod \"kube-proxy-hnhmw\" (UID: \"f63c7488-56ce-4c1c-af60-fb3eac8f7712\") " pod="kube-system/kube-proxy-hnhmw" Dec 13 02:05:16.645856 kubelet[2120]: I1213 02:05:16.645697 2120 topology_manager.go:215] "Topology Admit Handler" podUID="186dfab3-68a0-4efd-a068-d17c8765ff88" podNamespace="tigera-operator" podName="tigera-operator-7bc55997bb-wwzcs" Dec 13 02:05:16.654322 systemd[1]: Created slice kubepods-besteffort-pod186dfab3_68a0_4efd_a068_d17c8765ff88.slice. Dec 13 02:05:16.662598 kubelet[2120]: W1213 02:05:16.662549 2120 reflector.go:547] object-"tigera-operator"/"kubernetes-services-endpoint": failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal' and this object Dec 13 02:05:16.662598 kubelet[2120]: E1213 02:05:16.662610 2120 reflector.go:150] object-"tigera-operator"/"kubernetes-services-endpoint": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal' and this object Dec 13 02:05:16.666969 kubelet[2120]: W1213 02:05:16.666925 2120 reflector.go:547] object-"tigera-operator"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal' and this object Dec 13 02:05:16.667210 kubelet[2120]: E1213 02:05:16.666999 2120 reflector.go:150] object-"tigera-operator"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal' and this object Dec 13 02:05:16.699375 env[1236]: time="2024-12-13T02:05:16.699304259Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-hnhmw,Uid:f63c7488-56ce-4c1c-af60-fb3eac8f7712,Namespace:kube-system,Attempt:0,}" Dec 13 02:05:16.741665 env[1236]: time="2024-12-13T02:05:16.739276396Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:05:16.741665 env[1236]: time="2024-12-13T02:05:16.739343157Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:05:16.741665 env[1236]: time="2024-12-13T02:05:16.739363273Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:05:16.742007 env[1236]: time="2024-12-13T02:05:16.741757128Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0b242e33c93685efc956c6653a7f2903f8c5ca01b235ac707b829030fe86ac2b pid=2215 runtime=io.containerd.runc.v2 Dec 13 02:05:16.771316 systemd[1]: run-containerd-runc-k8s.io-0b242e33c93685efc956c6653a7f2903f8c5ca01b235ac707b829030fe86ac2b-runc.Mq80Hs.mount: Deactivated successfully. Dec 13 02:05:16.778480 systemd[1]: Started cri-containerd-0b242e33c93685efc956c6653a7f2903f8c5ca01b235ac707b829030fe86ac2b.scope. Dec 13 02:05:16.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.842311 kernel: audit: type=1400 audit(1734055516.797:813): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.842471 kernel: audit: type=1400 audit(1734055516.797:814): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.842524 kernel: audit: type=1400 audit(1734055516.797:815): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.842659 kubelet[2120]: I1213 02:05:16.841416 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/186dfab3-68a0-4efd-a068-d17c8765ff88-var-lib-calico\") pod \"tigera-operator-7bc55997bb-wwzcs\" (UID: \"186dfab3-68a0-4efd-a068-d17c8765ff88\") " pod="tigera-operator/tigera-operator-7bc55997bb-wwzcs" Dec 13 02:05:16.842659 kubelet[2120]: I1213 02:05:16.841490 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cfqjf\" (UniqueName: \"kubernetes.io/projected/186dfab3-68a0-4efd-a068-d17c8765ff88-kube-api-access-cfqjf\") pod \"tigera-operator-7bc55997bb-wwzcs\" (UID: \"186dfab3-68a0-4efd-a068-d17c8765ff88\") " pod="tigera-operator/tigera-operator-7bc55997bb-wwzcs" Dec 13 02:05:16.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.862364 kernel: audit: type=1400 audit(1734055516.797:816): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.904136 kernel: audit: type=1400 audit(1734055516.797:817): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.926159 kernel: audit: type=1400 audit(1734055516.797:818): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.948369 kernel: audit: type=1400 audit(1734055516.797:819): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.798000 audit: BPF prog-id=106 op=LOAD Dec 13 02:05:16.799000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.799000 audit[2226]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2215 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:16.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062323432653333633933363835656663393536633636353361376632 Dec 13 02:05:16.800000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.800000 audit[2226]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2215 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:16.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062323432653333633933363835656663393536633636353361376632 Dec 13 02:05:16.800000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.800000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.800000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.800000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.800000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.800000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.800000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.800000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.800000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.800000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.800000 audit: BPF prog-id=107 op=LOAD Dec 13 02:05:16.800000 audit[2226]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0001deaa0 items=0 ppid=2215 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:16.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062323432653333633933363835656663393536633636353361376632 Dec 13 02:05:16.860000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.860000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.860000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.860000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.860000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.860000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.860000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.860000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.860000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.860000 audit: BPF prog-id=108 op=LOAD Dec 13 02:05:16.860000 audit[2226]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0001deae8 items=0 ppid=2215 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:16.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062323432653333633933363835656663393536633636353361376632 Dec 13 02:05:16.882000 audit: BPF prog-id=108 op=UNLOAD Dec 13 02:05:16.882000 audit: BPF prog-id=107 op=UNLOAD Dec 13 02:05:16.882000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.882000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.882000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.882000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.882000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.882000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.882000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.882000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.882000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.882000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:16.882000 audit: BPF prog-id=109 op=LOAD Dec 13 02:05:16.882000 audit[2226]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0001deef8 items=0 ppid=2215 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:16.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062323432653333633933363835656663393536633636353361376632 Dec 13 02:05:16.970255 env[1236]: time="2024-12-13T02:05:16.970161585Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-hnhmw,Uid:f63c7488-56ce-4c1c-af60-fb3eac8f7712,Namespace:kube-system,Attempt:0,} returns sandbox id \"0b242e33c93685efc956c6653a7f2903f8c5ca01b235ac707b829030fe86ac2b\"" Dec 13 02:05:16.975351 env[1236]: time="2024-12-13T02:05:16.975289463Z" level=info msg="CreateContainer within sandbox \"0b242e33c93685efc956c6653a7f2903f8c5ca01b235ac707b829030fe86ac2b\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 02:05:16.995346 env[1236]: time="2024-12-13T02:05:16.995273165Z" level=info msg="CreateContainer within sandbox \"0b242e33c93685efc956c6653a7f2903f8c5ca01b235ac707b829030fe86ac2b\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"cdeb6de052b457b1c4343bb261835af996377b3a315cd62dc29d64e89fcd0d86\"" Dec 13 02:05:16.997644 env[1236]: time="2024-12-13T02:05:16.996317684Z" level=info msg="StartContainer for \"cdeb6de052b457b1c4343bb261835af996377b3a315cd62dc29d64e89fcd0d86\"" Dec 13 02:05:17.023715 systemd[1]: Started cri-containerd-cdeb6de052b457b1c4343bb261835af996377b3a315cd62dc29d64e89fcd0d86.scope. Dec 13 02:05:17.047000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:17.047000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f6fa8645c38 items=0 ppid=2215 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.047000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364656236646530353262343537623163343334336262323631383335 Dec 13 02:05:17.047000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:17.047000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:17.047000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:17.047000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:17.047000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:17.047000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:17.047000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:17.047000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:17.047000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:17.047000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:17.047000 audit: BPF prog-id=110 op=LOAD Dec 13 02:05:17.047000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002fdd48 items=0 ppid=2215 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.047000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364656236646530353262343537623163343334336262323631383335 Dec 13 02:05:17.048000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:17.048000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:17.048000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:17.048000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:17.048000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:17.048000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:17.048000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:17.048000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:17.048000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:17.048000 audit: BPF prog-id=111 op=LOAD Dec 13 02:05:17.048000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002fdd98 items=0 ppid=2215 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364656236646530353262343537623163343334336262323631383335 Dec 13 02:05:17.048000 audit: BPF prog-id=111 op=UNLOAD Dec 13 02:05:17.048000 audit: BPF prog-id=110 op=UNLOAD Dec 13 02:05:17.048000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:17.048000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:17.048000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:17.048000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:17.048000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:17.048000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:17.048000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:17.048000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:17.048000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:17.048000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:17.048000 audit: BPF prog-id=112 op=LOAD Dec 13 02:05:17.048000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002fde28 items=0 ppid=2215 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364656236646530353262343537623163343334336262323631383335 Dec 13 02:05:17.074055 env[1236]: time="2024-12-13T02:05:17.073979631Z" level=info msg="StartContainer for \"cdeb6de052b457b1c4343bb261835af996377b3a315cd62dc29d64e89fcd0d86\" returns successfully" Dec 13 02:05:17.168000 audit[2307]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2307 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:17.174000 audit[2308]: NETFILTER_CFG table=mangle:39 family=2 entries=1 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:17.174000 audit[2308]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc522a24b0 a2=0 a3=7ffc522a249c items=0 ppid=2267 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.174000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 02:05:17.176000 audit[2309]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2309 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:17.176000 audit[2309]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe734fd750 a2=0 a3=7ffe734fd73c items=0 ppid=2267 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.176000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 02:05:17.168000 audit[2307]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff4db5de00 a2=0 a3=7fff4db5ddec items=0 ppid=2267 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.168000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 02:05:17.178000 audit[2310]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=2310 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:17.178000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcc0603d50 a2=0 a3=7ffcc0603d3c items=0 ppid=2267 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.178000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 02:05:17.184000 audit[2311]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2311 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:17.184000 audit[2311]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd07964dd0 a2=0 a3=7ffd07964dbc items=0 ppid=2267 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.184000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 02:05:17.186000 audit[2312]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2312 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:17.186000 audit[2312]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff6371bce0 a2=0 a3=7fff6371bccc items=0 ppid=2267 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.186000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 02:05:17.271000 audit[2313]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2313 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:17.271000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff45b09280 a2=0 a3=7fff45b0926c items=0 ppid=2267 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.271000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 02:05:17.277000 audit[2315]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2315 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:17.277000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffee07f1920 a2=0 a3=7ffee07f190c items=0 ppid=2267 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.277000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 02:05:17.285000 audit[2318]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2318 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:17.285000 audit[2318]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe84b09ce0 a2=0 a3=7ffe84b09ccc items=0 ppid=2267 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.285000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 02:05:17.287000 audit[2319]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2319 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:17.287000 audit[2319]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc4f8a0cd0 a2=0 a3=7ffc4f8a0cbc items=0 ppid=2267 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.287000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 02:05:17.291000 audit[2321]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2321 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:17.291000 audit[2321]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdcfd79430 a2=0 a3=7ffdcfd7941c items=0 ppid=2267 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.291000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 02:05:17.293000 audit[2322]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2322 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:17.293000 audit[2322]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe6fb64710 a2=0 a3=7ffe6fb646fc items=0 ppid=2267 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.293000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 02:05:17.297000 audit[2324]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2324 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:17.297000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd303a3250 a2=0 a3=7ffd303a323c items=0 ppid=2267 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.297000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 02:05:17.303000 audit[2327]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2327 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:17.303000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff7601e930 a2=0 a3=7fff7601e91c items=0 ppid=2267 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.303000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 02:05:17.305000 audit[2328]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2328 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:17.305000 audit[2328]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd90aa7660 a2=0 a3=7ffd90aa764c items=0 ppid=2267 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.305000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 02:05:17.311000 audit[2330]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2330 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:17.311000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdd5d31a60 a2=0 a3=7ffdd5d31a4c items=0 ppid=2267 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.311000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 02:05:17.313000 audit[2331]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2331 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:17.313000 audit[2331]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffecbd231c0 a2=0 a3=7ffecbd231ac items=0 ppid=2267 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.313000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 02:05:17.319000 audit[2333]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2333 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:17.319000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe7d6ffd90 a2=0 a3=7ffe7d6ffd7c items=0 ppid=2267 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.319000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:05:17.325000 audit[2336]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2336 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:17.325000 audit[2336]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc40798ee0 a2=0 a3=7ffc40798ecc items=0 ppid=2267 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.325000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:05:17.332000 audit[2339]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2339 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:17.332000 audit[2339]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdf4378050 a2=0 a3=7ffdf437803c items=0 ppid=2267 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.332000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 02:05:17.334000 audit[2340]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2340 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:17.334000 audit[2340]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffca2adc660 a2=0 a3=7ffca2adc64c items=0 ppid=2267 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.334000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 02:05:17.340000 audit[2342]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2342 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:17.340000 audit[2342]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7fffe8d27fe0 a2=0 a3=7fffe8d27fcc items=0 ppid=2267 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.340000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:05:17.346000 audit[2345]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2345 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:17.346000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe5eabb4b0 a2=0 a3=7ffe5eabb49c items=0 ppid=2267 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.346000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:05:17.348000 audit[2346]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2346 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:17.348000 audit[2346]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc83912ea0 a2=0 a3=7ffc83912e8c items=0 ppid=2267 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.348000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 02:05:17.352000 audit[2348]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2348 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:17.352000 audit[2348]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fffe656c630 a2=0 a3=7fffe656c61c items=0 ppid=2267 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.352000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 02:05:17.384000 audit[2354]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2354 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:17.384000 audit[2354]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffd99b0cee0 a2=0 a3=7ffd99b0cecc items=0 ppid=2267 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.384000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:17.396000 audit[2354]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2354 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:17.396000 audit[2354]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffd99b0cee0 a2=0 a3=7ffd99b0cecc items=0 ppid=2267 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.396000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:17.399000 audit[2359]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2359 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:17.399000 audit[2359]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff0791e1f0 a2=0 a3=7fff0791e1dc items=0 ppid=2267 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.399000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 02:05:17.404000 audit[2361]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2361 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:17.404000 audit[2361]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc5523f6f0 a2=0 a3=7ffc5523f6dc items=0 ppid=2267 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.404000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 02:05:17.410000 audit[2364]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2364 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:17.410000 audit[2364]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc9ac404a0 a2=0 a3=7ffc9ac4048c items=0 ppid=2267 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.410000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 02:05:17.412000 audit[2365]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2365 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:17.412000 audit[2365]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd81f18500 a2=0 a3=7ffd81f184ec items=0 ppid=2267 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.412000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 02:05:17.417000 audit[2367]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2367 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:17.417000 audit[2367]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff5e1f1f00 a2=0 a3=7fff5e1f1eec items=0 ppid=2267 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.417000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 02:05:17.420000 audit[2368]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2368 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:17.420000 audit[2368]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcbb006f30 a2=0 a3=7ffcbb006f1c items=0 ppid=2267 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.420000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 02:05:17.425000 audit[2370]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2370 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:17.425000 audit[2370]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc6b944470 a2=0 a3=7ffc6b94445c items=0 ppid=2267 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.425000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 02:05:17.435000 audit[2373]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2373 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:17.435000 audit[2373]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd9d5d7760 a2=0 a3=7ffd9d5d774c items=0 ppid=2267 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.435000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 02:05:17.438000 audit[2374]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2374 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:17.438000 audit[2374]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcff1ab540 a2=0 a3=7ffcff1ab52c items=0 ppid=2267 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.438000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 02:05:17.442000 audit[2376]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2376 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:17.442000 audit[2376]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd9df97a30 a2=0 a3=7ffd9df97a1c items=0 ppid=2267 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.442000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 02:05:17.443000 audit[2377]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2377 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:17.443000 audit[2377]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc91c48ca0 a2=0 a3=7ffc91c48c8c items=0 ppid=2267 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.443000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 02:05:17.447000 audit[2379]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2379 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:17.447000 audit[2379]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd8be94100 a2=0 a3=7ffd8be940ec items=0 ppid=2267 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.447000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:05:17.454000 audit[2382]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2382 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:17.454000 audit[2382]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdb4205770 a2=0 a3=7ffdb420575c items=0 ppid=2267 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.454000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 02:05:17.460000 audit[2385]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2385 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:17.460000 audit[2385]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff4c0770d0 a2=0 a3=7fff4c0770bc items=0 ppid=2267 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.460000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 02:05:17.462000 audit[2386]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2386 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:17.462000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff071c4ae0 a2=0 a3=7fff071c4acc items=0 ppid=2267 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.462000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 02:05:17.466000 audit[2388]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2388 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:17.466000 audit[2388]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc03e393f0 a2=0 a3=7ffc03e393dc items=0 ppid=2267 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.466000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:05:17.471000 audit[2391]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2391 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:17.471000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffee3351e20 a2=0 a3=7ffee3351e0c items=0 ppid=2267 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.471000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:05:17.473000 audit[2392]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2392 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:17.473000 audit[2392]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb8fb8c90 a2=0 a3=7ffdb8fb8c7c items=0 ppid=2267 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.473000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 02:05:17.477000 audit[2394]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2394 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:17.477000 audit[2394]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd9961e8c0 a2=0 a3=7ffd9961e8ac items=0 ppid=2267 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.477000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 02:05:17.478000 audit[2395]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2395 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:17.478000 audit[2395]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc93f9caa0 a2=0 a3=7ffc93f9ca8c items=0 ppid=2267 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.478000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 02:05:17.482000 audit[2397]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2397 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:17.482000 audit[2397]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffce0d5b6a0 a2=0 a3=7ffce0d5b68c items=0 ppid=2267 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.482000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:05:17.488000 audit[2400]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2400 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:17.488000 audit[2400]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe8e62e570 a2=0 a3=7ffe8e62e55c items=0 ppid=2267 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.488000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:05:17.493000 audit[2402]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2402 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 02:05:17.493000 audit[2402]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffeb6abdd40 a2=0 a3=7ffeb6abdd2c items=0 ppid=2267 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.493000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:17.493000 audit[2402]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2402 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 02:05:17.493000 audit[2402]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffeb6abdd40 a2=0 a3=7ffeb6abdd2c items=0 ppid=2267 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.493000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:17.958993 kubelet[2120]: E1213 02:05:17.958936 2120 projected.go:294] Couldn't get configMap tigera-operator/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Dec 13 02:05:17.958993 kubelet[2120]: E1213 02:05:17.958988 2120 projected.go:200] Error preparing data for projected volume kube-api-access-cfqjf for pod tigera-operator/tigera-operator-7bc55997bb-wwzcs: failed to sync configmap cache: timed out waiting for the condition Dec 13 02:05:17.959658 kubelet[2120]: E1213 02:05:17.959087 2120 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/186dfab3-68a0-4efd-a068-d17c8765ff88-kube-api-access-cfqjf podName:186dfab3-68a0-4efd-a068-d17c8765ff88 nodeName:}" failed. No retries permitted until 2024-12-13 02:05:18.459057836 +0000 UTC m=+17.369609456 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-cfqjf" (UniqueName: "kubernetes.io/projected/186dfab3-68a0-4efd-a068-d17c8765ff88-kube-api-access-cfqjf") pod "tigera-operator-7bc55997bb-wwzcs" (UID: "186dfab3-68a0-4efd-a068-d17c8765ff88") : failed to sync configmap cache: timed out waiting for the condition Dec 13 02:05:18.759930 env[1236]: time="2024-12-13T02:05:18.759870401Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7bc55997bb-wwzcs,Uid:186dfab3-68a0-4efd-a068-d17c8765ff88,Namespace:tigera-operator,Attempt:0,}" Dec 13 02:05:18.788963 env[1236]: time="2024-12-13T02:05:18.788801331Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:05:18.789575 env[1236]: time="2024-12-13T02:05:18.788930184Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:05:18.789575 env[1236]: time="2024-12-13T02:05:18.788969203Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:05:18.789856 env[1236]: time="2024-12-13T02:05:18.789718399Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d39fc807354c3e5a2a10a724977845d23aba4f99077c45a82c8afcca26443e9a pid=2412 runtime=io.containerd.runc.v2 Dec 13 02:05:18.827598 systemd[1]: run-containerd-runc-k8s.io-d39fc807354c3e5a2a10a724977845d23aba4f99077c45a82c8afcca26443e9a-runc.aKu8Rk.mount: Deactivated successfully. Dec 13 02:05:18.832242 systemd[1]: Started cri-containerd-d39fc807354c3e5a2a10a724977845d23aba4f99077c45a82c8afcca26443e9a.scope. Dec 13 02:05:18.875008 kernel: kauditd_printk_skb: 246 callbacks suppressed Dec 13 02:05:18.875215 kernel: audit: type=1400 audit(1734055518.847:888): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.899427 kernel: audit: type=1400 audit(1734055518.847:889): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.899564 kernel: audit: type=1400 audit(1734055518.847:890): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.940710 kernel: audit: type=1400 audit(1734055518.847:891): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.940874 kernel: audit: type=1400 audit(1734055518.847:892): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.982338 kernel: audit: type=1400 audit(1734055518.847:893): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.982509 kernel: audit: type=1400 audit(1734055518.847:894): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:19.003482 kernel: audit: type=1400 audit(1734055518.847:895): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:19.044459 kernel: audit: type=1400 audit(1734055518.847:896): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:19.067170 kernel: audit: type=1400 audit(1734055518.874:897): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.874000 audit: BPF prog-id=113 op=LOAD Dec 13 02:05:18.876000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.876000 audit[2422]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2412 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:18.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433396663383037333534633365356132613130613732343937373834 Dec 13 02:05:18.876000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.876000 audit[2422]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2412 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:18.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433396663383037333534633365356132613130613732343937373834 Dec 13 02:05:18.876000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.876000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.876000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.876000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.876000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.876000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.876000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.876000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.876000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.876000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.876000 audit: BPF prog-id=114 op=LOAD Dec 13 02:05:18.876000 audit[2422]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00035ed90 items=0 ppid=2412 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:18.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433396663383037333534633365356132613130613732343937373834 Dec 13 02:05:18.876000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.876000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.876000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.876000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.876000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.876000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.876000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.876000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.876000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.876000 audit: BPF prog-id=115 op=LOAD Dec 13 02:05:18.876000 audit[2422]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00035edd8 items=0 ppid=2412 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:18.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433396663383037333534633365356132613130613732343937373834 Dec 13 02:05:18.876000 audit: BPF prog-id=115 op=UNLOAD Dec 13 02:05:18.876000 audit: BPF prog-id=114 op=UNLOAD Dec 13 02:05:18.876000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.876000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.876000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.876000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.876000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.876000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.876000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.876000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.876000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.876000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:18.876000 audit: BPF prog-id=116 op=LOAD Dec 13 02:05:18.876000 audit[2422]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00035f1e8 items=0 ppid=2412 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:18.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433396663383037333534633365356132613130613732343937373834 Dec 13 02:05:19.071531 env[1236]: time="2024-12-13T02:05:19.071477367Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7bc55997bb-wwzcs,Uid:186dfab3-68a0-4efd-a068-d17c8765ff88,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"d39fc807354c3e5a2a10a724977845d23aba4f99077c45a82c8afcca26443e9a\"" Dec 13 02:05:19.074160 env[1236]: time="2024-12-13T02:05:19.073926583Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 02:05:20.980224 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1927436865.mount: Deactivated successfully. Dec 13 02:05:21.855300 env[1236]: time="2024-12-13T02:05:21.855227633Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:21.858070 env[1236]: time="2024-12-13T02:05:21.857999027Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:21.860662 env[1236]: time="2024-12-13T02:05:21.860611920Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:21.862930 env[1236]: time="2024-12-13T02:05:21.862881514Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:21.863697 env[1236]: time="2024-12-13T02:05:21.863644650Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Dec 13 02:05:21.868716 env[1236]: time="2024-12-13T02:05:21.868656492Z" level=info msg="CreateContainer within sandbox \"d39fc807354c3e5a2a10a724977845d23aba4f99077c45a82c8afcca26443e9a\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 02:05:21.887191 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount741867680.mount: Deactivated successfully. Dec 13 02:05:21.896171 env[1236]: time="2024-12-13T02:05:21.896093562Z" level=info msg="CreateContainer within sandbox \"d39fc807354c3e5a2a10a724977845d23aba4f99077c45a82c8afcca26443e9a\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"2acc3d59575e3cf79f10639c66fb0fd3d9882086a1abe25e962dc8ff7282c0c9\"" Dec 13 02:05:21.898362 env[1236]: time="2024-12-13T02:05:21.898279476Z" level=info msg="StartContainer for \"2acc3d59575e3cf79f10639c66fb0fd3d9882086a1abe25e962dc8ff7282c0c9\"" Dec 13 02:05:21.939660 systemd[1]: run-containerd-runc-k8s.io-2acc3d59575e3cf79f10639c66fb0fd3d9882086a1abe25e962dc8ff7282c0c9-runc.ZRJLf0.mount: Deactivated successfully. Dec 13 02:05:21.947378 systemd[1]: Started cri-containerd-2acc3d59575e3cf79f10639c66fb0fd3d9882086a1abe25e962dc8ff7282c0c9.scope. Dec 13 02:05:21.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:21.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:21.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:21.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:21.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:21.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:21.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:21.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:21.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:21.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:21.964000 audit: BPF prog-id=117 op=LOAD Dec 13 02:05:21.965000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:21.965000 audit[2454]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2412 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:21.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261636333643539353735653363663739663130363339633636666230 Dec 13 02:05:21.965000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:21.965000 audit[2454]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2412 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:21.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261636333643539353735653363663739663130363339633636666230 Dec 13 02:05:21.965000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:21.965000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:21.965000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:21.965000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:21.965000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:21.965000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:21.965000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:21.965000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:21.965000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:21.965000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:21.965000 audit: BPF prog-id=118 op=LOAD Dec 13 02:05:21.965000 audit[2454]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000094e20 items=0 ppid=2412 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:21.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261636333643539353735653363663739663130363339633636666230 Dec 13 02:05:21.965000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:21.965000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:21.965000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:21.965000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:21.965000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:21.965000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:21.965000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:21.965000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:21.965000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:21.965000 audit: BPF prog-id=119 op=LOAD Dec 13 02:05:21.965000 audit[2454]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000094e68 items=0 ppid=2412 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:21.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261636333643539353735653363663739663130363339633636666230 Dec 13 02:05:21.965000 audit: BPF prog-id=119 op=UNLOAD Dec 13 02:05:21.965000 audit: BPF prog-id=118 op=UNLOAD Dec 13 02:05:21.965000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:21.965000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:21.965000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:21.965000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:21.965000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:21.965000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:21.965000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:21.965000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:21.965000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:21.965000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:21.965000 audit: BPF prog-id=120 op=LOAD Dec 13 02:05:21.965000 audit[2454]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000095278 items=0 ppid=2412 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:21.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261636333643539353735653363663739663130363339633636666230 Dec 13 02:05:21.997644 env[1236]: time="2024-12-13T02:05:21.997562925Z" level=info msg="StartContainer for \"2acc3d59575e3cf79f10639c66fb0fd3d9882086a1abe25e962dc8ff7282c0c9\" returns successfully" Dec 13 02:05:22.336580 kubelet[2120]: I1213 02:05:22.336123 2120 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-hnhmw" podStartSLOduration=6.336077046 podStartE2EDuration="6.336077046s" podCreationTimestamp="2024-12-13 02:05:16 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:05:17.338092222 +0000 UTC m=+16.248643875" watchObservedRunningTime="2024-12-13 02:05:22.336077046 +0000 UTC m=+21.246628699" Dec 13 02:05:22.336580 kubelet[2120]: I1213 02:05:22.336325 2120 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7bc55997bb-wwzcs" podStartSLOduration=3.54395739 podStartE2EDuration="6.336312414s" podCreationTimestamp="2024-12-13 02:05:16 +0000 UTC" firstStartedPulling="2024-12-13 02:05:19.073279058 +0000 UTC m=+17.983830692" lastFinishedPulling="2024-12-13 02:05:21.86563408 +0000 UTC m=+20.776185716" observedRunningTime="2024-12-13 02:05:22.335734383 +0000 UTC m=+21.246286057" watchObservedRunningTime="2024-12-13 02:05:22.336312414 +0000 UTC m=+21.246864061" Dec 13 02:05:25.093000 audit[2487]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2487 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:25.102163 kernel: kauditd_printk_skb: 104 callbacks suppressed Dec 13 02:05:25.102351 kernel: audit: type=1325 audit(1734055525.093:924): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2487 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:25.093000 audit[2487]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffc46e8e410 a2=0 a3=7ffc46e8e3fc items=0 ppid=2267 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.149811 kernel: audit: type=1300 audit(1734055525.093:924): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffc46e8e410 a2=0 a3=7ffc46e8e3fc items=0 ppid=2267 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.150008 kernel: audit: type=1327 audit(1734055525.093:924): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:25.093000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:25.148000 audit[2487]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2487 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:25.179844 kernel: audit: type=1325 audit(1734055525.148:925): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2487 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:25.148000 audit[2487]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc46e8e410 a2=0 a3=0 items=0 ppid=2267 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.213178 kernel: audit: type=1300 audit(1734055525.148:925): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc46e8e410 a2=0 a3=0 items=0 ppid=2267 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.148000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:25.238169 kernel: audit: type=1327 audit(1734055525.148:925): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:25.283000 audit[2490]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2490 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:25.302319 kernel: audit: type=1325 audit(1734055525.283:926): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2490 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:25.283000 audit[2490]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd1919e560 a2=0 a3=7ffd1919e54c items=0 ppid=2267 pid=2490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.340181 kernel: audit: type=1300 audit(1734055525.283:926): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd1919e560 a2=0 a3=7ffd1919e54c items=0 ppid=2267 pid=2490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.283000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:25.366185 kernel: audit: type=1327 audit(1734055525.283:926): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:25.369129 kubelet[2120]: I1213 02:05:25.368000 2120 topology_manager.go:215] "Topology Admit Handler" podUID="f37c9b0d-5d66-44af-8053-eea90e783c17" podNamespace="calico-system" podName="calico-typha-6f5775d44c-59t8d" Dec 13 02:05:25.340000 audit[2490]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2490 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:25.378219 systemd[1]: Created slice kubepods-besteffort-podf37c9b0d_5d66_44af_8053_eea90e783c17.slice. Dec 13 02:05:25.385137 kernel: audit: type=1325 audit(1734055525.340:927): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2490 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:25.340000 audit[2490]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd1919e560 a2=0 a3=0 items=0 ppid=2267 pid=2490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.340000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:25.389897 kubelet[2120]: W1213 02:05:25.389856 2120 reflector.go:547] object-"calico-system"/"typha-certs": failed to list *v1.Secret: secrets "typha-certs" is forbidden: User "system:node:ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal' and this object Dec 13 02:05:25.390416 kubelet[2120]: E1213 02:05:25.390388 2120 reflector.go:150] object-"calico-system"/"typha-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "typha-certs" is forbidden: User "system:node:ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal' and this object Dec 13 02:05:25.390777 kubelet[2120]: W1213 02:05:25.390751 2120 reflector.go:547] object-"calico-system"/"tigera-ca-bundle": failed to list *v1.ConfigMap: configmaps "tigera-ca-bundle" is forbidden: User "system:node:ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal' and this object Dec 13 02:05:25.390964 kubelet[2120]: E1213 02:05:25.390943 2120 reflector.go:150] object-"calico-system"/"tigera-ca-bundle": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "tigera-ca-bundle" is forbidden: User "system:node:ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal' and this object Dec 13 02:05:25.391223 kubelet[2120]: W1213 02:05:25.391192 2120 reflector.go:547] object-"calico-system"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal' and this object Dec 13 02:05:25.391424 kubelet[2120]: E1213 02:05:25.391405 2120 reflector.go:150] object-"calico-system"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal' and this object Dec 13 02:05:25.450274 kubelet[2120]: I1213 02:05:25.450230 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/f37c9b0d-5d66-44af-8053-eea90e783c17-typha-certs\") pod \"calico-typha-6f5775d44c-59t8d\" (UID: \"f37c9b0d-5d66-44af-8053-eea90e783c17\") " pod="calico-system/calico-typha-6f5775d44c-59t8d" Dec 13 02:05:25.450631 kubelet[2120]: I1213 02:05:25.450572 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jfqd9\" (UniqueName: \"kubernetes.io/projected/f37c9b0d-5d66-44af-8053-eea90e783c17-kube-api-access-jfqd9\") pod \"calico-typha-6f5775d44c-59t8d\" (UID: \"f37c9b0d-5d66-44af-8053-eea90e783c17\") " pod="calico-system/calico-typha-6f5775d44c-59t8d" Dec 13 02:05:25.450889 kubelet[2120]: I1213 02:05:25.450865 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f37c9b0d-5d66-44af-8053-eea90e783c17-tigera-ca-bundle\") pod \"calico-typha-6f5775d44c-59t8d\" (UID: \"f37c9b0d-5d66-44af-8053-eea90e783c17\") " pod="calico-system/calico-typha-6f5775d44c-59t8d" Dec 13 02:05:25.518275 kubelet[2120]: I1213 02:05:25.518228 2120 topology_manager.go:215] "Topology Admit Handler" podUID="06780d88-08f4-4d32-a928-20ba5afaf400" podNamespace="calico-system" podName="calico-node-ddmfn" Dec 13 02:05:25.530033 systemd[1]: Created slice kubepods-besteffort-pod06780d88_08f4_4d32_a928_20ba5afaf400.slice. Dec 13 02:05:25.551543 kubelet[2120]: I1213 02:05:25.551492 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hvv7k\" (UniqueName: \"kubernetes.io/projected/06780d88-08f4-4d32-a928-20ba5afaf400-kube-api-access-hvv7k\") pod \"calico-node-ddmfn\" (UID: \"06780d88-08f4-4d32-a928-20ba5afaf400\") " pod="calico-system/calico-node-ddmfn" Dec 13 02:05:25.552472 kubelet[2120]: I1213 02:05:25.552304 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/06780d88-08f4-4d32-a928-20ba5afaf400-policysync\") pod \"calico-node-ddmfn\" (UID: \"06780d88-08f4-4d32-a928-20ba5afaf400\") " pod="calico-system/calico-node-ddmfn" Dec 13 02:05:25.552768 kubelet[2120]: I1213 02:05:25.552733 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/06780d88-08f4-4d32-a928-20ba5afaf400-tigera-ca-bundle\") pod \"calico-node-ddmfn\" (UID: \"06780d88-08f4-4d32-a928-20ba5afaf400\") " pod="calico-system/calico-node-ddmfn" Dec 13 02:05:25.553028 kubelet[2120]: I1213 02:05:25.553003 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/06780d88-08f4-4d32-a928-20ba5afaf400-node-certs\") pod \"calico-node-ddmfn\" (UID: \"06780d88-08f4-4d32-a928-20ba5afaf400\") " pod="calico-system/calico-node-ddmfn" Dec 13 02:05:25.553296 kubelet[2120]: I1213 02:05:25.553246 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/06780d88-08f4-4d32-a928-20ba5afaf400-var-run-calico\") pod \"calico-node-ddmfn\" (UID: \"06780d88-08f4-4d32-a928-20ba5afaf400\") " pod="calico-system/calico-node-ddmfn" Dec 13 02:05:25.553551 kubelet[2120]: I1213 02:05:25.553525 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/06780d88-08f4-4d32-a928-20ba5afaf400-var-lib-calico\") pod \"calico-node-ddmfn\" (UID: \"06780d88-08f4-4d32-a928-20ba5afaf400\") " pod="calico-system/calico-node-ddmfn" Dec 13 02:05:25.553821 kubelet[2120]: I1213 02:05:25.553782 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/06780d88-08f4-4d32-a928-20ba5afaf400-xtables-lock\") pod \"calico-node-ddmfn\" (UID: \"06780d88-08f4-4d32-a928-20ba5afaf400\") " pod="calico-system/calico-node-ddmfn" Dec 13 02:05:25.554060 kubelet[2120]: I1213 02:05:25.554038 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/06780d88-08f4-4d32-a928-20ba5afaf400-cni-net-dir\") pod \"calico-node-ddmfn\" (UID: \"06780d88-08f4-4d32-a928-20ba5afaf400\") " pod="calico-system/calico-node-ddmfn" Dec 13 02:05:25.554433 kubelet[2120]: I1213 02:05:25.554280 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/06780d88-08f4-4d32-a928-20ba5afaf400-flexvol-driver-host\") pod \"calico-node-ddmfn\" (UID: \"06780d88-08f4-4d32-a928-20ba5afaf400\") " pod="calico-system/calico-node-ddmfn" Dec 13 02:05:25.554705 kubelet[2120]: I1213 02:05:25.554681 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/06780d88-08f4-4d32-a928-20ba5afaf400-cni-bin-dir\") pod \"calico-node-ddmfn\" (UID: \"06780d88-08f4-4d32-a928-20ba5afaf400\") " pod="calico-system/calico-node-ddmfn" Dec 13 02:05:25.555371 kubelet[2120]: I1213 02:05:25.555329 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/06780d88-08f4-4d32-a928-20ba5afaf400-lib-modules\") pod \"calico-node-ddmfn\" (UID: \"06780d88-08f4-4d32-a928-20ba5afaf400\") " pod="calico-system/calico-node-ddmfn" Dec 13 02:05:25.555546 kubelet[2120]: I1213 02:05:25.555522 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/06780d88-08f4-4d32-a928-20ba5afaf400-cni-log-dir\") pod \"calico-node-ddmfn\" (UID: \"06780d88-08f4-4d32-a928-20ba5afaf400\") " pod="calico-system/calico-node-ddmfn" Dec 13 02:05:25.657590 kubelet[2120]: E1213 02:05:25.657475 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.657826 kubelet[2120]: W1213 02:05:25.657800 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.657983 kubelet[2120]: E1213 02:05:25.657958 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.660559 kubelet[2120]: E1213 02:05:25.660492 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.660761 kubelet[2120]: W1213 02:05:25.660737 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.661390 kubelet[2120]: E1213 02:05:25.661178 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.661690 kubelet[2120]: E1213 02:05:25.661614 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.661911 kubelet[2120]: W1213 02:05:25.661858 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.662048 kubelet[2120]: E1213 02:05:25.662032 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.663235 kubelet[2120]: E1213 02:05:25.663209 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.663421 kubelet[2120]: W1213 02:05:25.663401 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.663591 kubelet[2120]: E1213 02:05:25.663573 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.664028 kubelet[2120]: E1213 02:05:25.664010 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.664197 kubelet[2120]: W1213 02:05:25.664177 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.664328 kubelet[2120]: E1213 02:05:25.664311 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.664741 kubelet[2120]: E1213 02:05:25.664724 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.664868 kubelet[2120]: W1213 02:05:25.664850 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.665159 kubelet[2120]: E1213 02:05:25.665139 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.665484 kubelet[2120]: E1213 02:05:25.665469 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.665599 kubelet[2120]: W1213 02:05:25.665583 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.665796 kubelet[2120]: E1213 02:05:25.665780 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.666211 kubelet[2120]: E1213 02:05:25.666194 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.666345 kubelet[2120]: W1213 02:05:25.666326 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.666551 kubelet[2120]: E1213 02:05:25.666534 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.666861 kubelet[2120]: E1213 02:05:25.666846 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.666998 kubelet[2120]: W1213 02:05:25.666980 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.669238 kubelet[2120]: E1213 02:05:25.669204 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.669737 kubelet[2120]: E1213 02:05:25.669718 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.669912 kubelet[2120]: W1213 02:05:25.669855 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.670186 kubelet[2120]: E1213 02:05:25.670167 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.670808 kubelet[2120]: E1213 02:05:25.670791 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.670967 kubelet[2120]: W1213 02:05:25.670947 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.671093 kubelet[2120]: E1213 02:05:25.671076 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.671589 kubelet[2120]: E1213 02:05:25.671570 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.671722 kubelet[2120]: W1213 02:05:25.671704 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.671944 kubelet[2120]: E1213 02:05:25.671925 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.672309 kubelet[2120]: E1213 02:05:25.672292 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.672451 kubelet[2120]: W1213 02:05:25.672432 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.672667 kubelet[2120]: E1213 02:05:25.672649 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.672990 kubelet[2120]: E1213 02:05:25.672974 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.675144 kubelet[2120]: W1213 02:05:25.673096 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.675486 kubelet[2120]: E1213 02:05:25.675465 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.675898 kubelet[2120]: E1213 02:05:25.675879 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.676039 kubelet[2120]: W1213 02:05:25.676021 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.676316 kubelet[2120]: E1213 02:05:25.676298 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.676703 kubelet[2120]: E1213 02:05:25.676685 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.676840 kubelet[2120]: W1213 02:05:25.676821 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.679445 kubelet[2120]: E1213 02:05:25.679416 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.679666 kubelet[2120]: E1213 02:05:25.679649 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.679815 kubelet[2120]: W1213 02:05:25.679794 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.680073 kubelet[2120]: E1213 02:05:25.680049 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.680344 kubelet[2120]: E1213 02:05:25.680327 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.680463 kubelet[2120]: W1213 02:05:25.680446 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.680689 kubelet[2120]: E1213 02:05:25.680666 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.680935 kubelet[2120]: E1213 02:05:25.680919 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.681068 kubelet[2120]: W1213 02:05:25.681048 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.681340 kubelet[2120]: E1213 02:05:25.681317 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.681567 kubelet[2120]: E1213 02:05:25.681551 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.681694 kubelet[2120]: W1213 02:05:25.681675 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.681939 kubelet[2120]: E1213 02:05:25.681916 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.682178 kubelet[2120]: E1213 02:05:25.682163 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.682314 kubelet[2120]: W1213 02:05:25.682298 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.682530 kubelet[2120]: E1213 02:05:25.682509 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.682704 kubelet[2120]: E1213 02:05:25.682691 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.682807 kubelet[2120]: W1213 02:05:25.682791 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.683055 kubelet[2120]: E1213 02:05:25.683034 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.683339 kubelet[2120]: E1213 02:05:25.683326 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.683461 kubelet[2120]: W1213 02:05:25.683445 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.683673 kubelet[2120]: E1213 02:05:25.683655 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.686326 kubelet[2120]: E1213 02:05:25.686303 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.686521 kubelet[2120]: W1213 02:05:25.686500 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.686944 kubelet[2120]: E1213 02:05:25.686925 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.687075 kubelet[2120]: W1213 02:05:25.687055 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.701269 kubelet[2120]: E1213 02:05:25.701236 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.701484 kubelet[2120]: W1213 02:05:25.701458 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.701606 kubelet[2120]: E1213 02:05:25.701587 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.702166 kubelet[2120]: E1213 02:05:25.702076 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.702449 kubelet[2120]: E1213 02:05:25.702344 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.702635 kubelet[2120]: E1213 02:05:25.702404 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.702787 kubelet[2120]: W1213 02:05:25.702768 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.702899 kubelet[2120]: E1213 02:05:25.702883 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.707608 kubelet[2120]: E1213 02:05:25.707305 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.707608 kubelet[2120]: W1213 02:05:25.707330 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.707608 kubelet[2120]: E1213 02:05:25.707364 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.708018 kubelet[2120]: E1213 02:05:25.707994 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.708018 kubelet[2120]: W1213 02:05:25.708016 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.708264 kubelet[2120]: E1213 02:05:25.708241 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.708384 kubelet[2120]: E1213 02:05:25.708357 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.708384 kubelet[2120]: W1213 02:05:25.708379 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.708506 kubelet[2120]: E1213 02:05:25.708397 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.777804 kubelet[2120]: E1213 02:05:25.777764 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.778069 kubelet[2120]: W1213 02:05:25.778039 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.778258 kubelet[2120]: E1213 02:05:25.778236 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.778701 kubelet[2120]: E1213 02:05:25.778678 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.778866 kubelet[2120]: W1213 02:05:25.778845 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.779002 kubelet[2120]: E1213 02:05:25.778966 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.779455 kubelet[2120]: E1213 02:05:25.779435 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.779602 kubelet[2120]: W1213 02:05:25.779582 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.779711 kubelet[2120]: E1213 02:05:25.779693 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.780130 kubelet[2120]: E1213 02:05:25.780084 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.780256 kubelet[2120]: W1213 02:05:25.780236 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.780360 kubelet[2120]: E1213 02:05:25.780343 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.780793 kubelet[2120]: E1213 02:05:25.780774 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.780931 kubelet[2120]: W1213 02:05:25.780911 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.781045 kubelet[2120]: E1213 02:05:25.781028 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.786481 kubelet[2120]: I1213 02:05:25.786441 2120 topology_manager.go:215] "Topology Admit Handler" podUID="fe43aeca-7618-49ba-af44-ec58d6fa89be" podNamespace="calico-system" podName="csi-node-driver-25lng" Dec 13 02:05:25.786856 kubelet[2120]: E1213 02:05:25.786826 2120 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-25lng" podUID="fe43aeca-7618-49ba-af44-ec58d6fa89be" Dec 13 02:05:25.853526 kubelet[2120]: E1213 02:05:25.853487 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.853765 kubelet[2120]: W1213 02:05:25.853734 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.853950 kubelet[2120]: E1213 02:05:25.853921 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.854422 kubelet[2120]: E1213 02:05:25.854400 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.854557 kubelet[2120]: W1213 02:05:25.854538 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.854717 kubelet[2120]: E1213 02:05:25.854694 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.855313 kubelet[2120]: E1213 02:05:25.855293 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.855456 kubelet[2120]: W1213 02:05:25.855437 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.855578 kubelet[2120]: E1213 02:05:25.855559 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.856358 kubelet[2120]: E1213 02:05:25.856338 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.856487 kubelet[2120]: W1213 02:05:25.856467 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.856668 kubelet[2120]: E1213 02:05:25.856648 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.857148 kubelet[2120]: E1213 02:05:25.857081 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.857299 kubelet[2120]: W1213 02:05:25.857277 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.857413 kubelet[2120]: E1213 02:05:25.857394 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.857807 kubelet[2120]: E1213 02:05:25.857788 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.857939 kubelet[2120]: W1213 02:05:25.857919 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.858062 kubelet[2120]: E1213 02:05:25.858044 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.858472 kubelet[2120]: E1213 02:05:25.858453 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.858608 kubelet[2120]: W1213 02:05:25.858589 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.858726 kubelet[2120]: E1213 02:05:25.858709 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.859096 kubelet[2120]: E1213 02:05:25.859078 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.859268 kubelet[2120]: W1213 02:05:25.859247 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.859385 kubelet[2120]: E1213 02:05:25.859367 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.859776 kubelet[2120]: E1213 02:05:25.859757 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.859906 kubelet[2120]: W1213 02:05:25.859887 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.860013 kubelet[2120]: E1213 02:05:25.859997 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.862887 kubelet[2120]: E1213 02:05:25.862853 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.863056 kubelet[2120]: W1213 02:05:25.863037 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.863235 kubelet[2120]: E1213 02:05:25.863213 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.863724 kubelet[2120]: E1213 02:05:25.863708 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.863865 kubelet[2120]: W1213 02:05:25.863842 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.863992 kubelet[2120]: E1213 02:05:25.863977 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.864481 kubelet[2120]: E1213 02:05:25.864450 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.864617 kubelet[2120]: W1213 02:05:25.864597 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.864765 kubelet[2120]: E1213 02:05:25.864743 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.865314 kubelet[2120]: E1213 02:05:25.865286 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.865479 kubelet[2120]: W1213 02:05:25.865460 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.865621 kubelet[2120]: E1213 02:05:25.865603 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.866085 kubelet[2120]: E1213 02:05:25.866066 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.866273 kubelet[2120]: W1213 02:05:25.866251 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.866431 kubelet[2120]: E1213 02:05:25.866412 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.866955 kubelet[2120]: E1213 02:05:25.866913 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.867150 kubelet[2120]: W1213 02:05:25.867094 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.867353 kubelet[2120]: E1213 02:05:25.867333 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.867866 kubelet[2120]: E1213 02:05:25.867837 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.868008 kubelet[2120]: W1213 02:05:25.867988 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.868235 kubelet[2120]: E1213 02:05:25.868216 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.868728 kubelet[2120]: E1213 02:05:25.868709 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.868879 kubelet[2120]: W1213 02:05:25.868859 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.869026 kubelet[2120]: E1213 02:05:25.869009 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.869535 kubelet[2120]: E1213 02:05:25.869517 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.869682 kubelet[2120]: W1213 02:05:25.869662 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.869830 kubelet[2120]: E1213 02:05:25.869811 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.870352 kubelet[2120]: E1213 02:05:25.870333 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.870491 kubelet[2120]: W1213 02:05:25.870471 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.870609 kubelet[2120]: E1213 02:05:25.870590 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.871024 kubelet[2120]: E1213 02:05:25.871006 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.871253 kubelet[2120]: W1213 02:05:25.871222 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.871385 kubelet[2120]: E1213 02:05:25.871366 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.882589 kubelet[2120]: E1213 02:05:25.882552 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.882882 kubelet[2120]: W1213 02:05:25.882850 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.883093 kubelet[2120]: E1213 02:05:25.883065 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.883334 kubelet[2120]: I1213 02:05:25.883299 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/fe43aeca-7618-49ba-af44-ec58d6fa89be-varrun\") pod \"csi-node-driver-25lng\" (UID: \"fe43aeca-7618-49ba-af44-ec58d6fa89be\") " pod="calico-system/csi-node-driver-25lng" Dec 13 02:05:25.883874 kubelet[2120]: E1213 02:05:25.883851 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.884025 kubelet[2120]: W1213 02:05:25.884004 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.884241 kubelet[2120]: E1213 02:05:25.884221 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.884771 kubelet[2120]: E1213 02:05:25.884749 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.884914 kubelet[2120]: W1213 02:05:25.884891 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.885282 kubelet[2120]: E1213 02:05:25.885258 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.885597 kubelet[2120]: I1213 02:05:25.885570 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/fe43aeca-7618-49ba-af44-ec58d6fa89be-registration-dir\") pod \"csi-node-driver-25lng\" (UID: \"fe43aeca-7618-49ba-af44-ec58d6fa89be\") " pod="calico-system/csi-node-driver-25lng" Dec 13 02:05:25.885991 kubelet[2120]: E1213 02:05:25.885972 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.886177 kubelet[2120]: W1213 02:05:25.886156 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.886353 kubelet[2120]: E1213 02:05:25.886333 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.886956 kubelet[2120]: E1213 02:05:25.886927 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.887090 kubelet[2120]: W1213 02:05:25.887073 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.887857 kubelet[2120]: E1213 02:05:25.887836 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.888427 kubelet[2120]: E1213 02:05:25.888396 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.888584 kubelet[2120]: W1213 02:05:25.888565 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.888726 kubelet[2120]: E1213 02:05:25.888708 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.888990 kubelet[2120]: I1213 02:05:25.888966 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/fe43aeca-7618-49ba-af44-ec58d6fa89be-socket-dir\") pod \"csi-node-driver-25lng\" (UID: \"fe43aeca-7618-49ba-af44-ec58d6fa89be\") " pod="calico-system/csi-node-driver-25lng" Dec 13 02:05:25.889237 kubelet[2120]: E1213 02:05:25.889201 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.889356 kubelet[2120]: W1213 02:05:25.889340 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.889460 kubelet[2120]: E1213 02:05:25.889443 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.890615 kubelet[2120]: E1213 02:05:25.890595 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.890773 kubelet[2120]: W1213 02:05:25.890750 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.890947 kubelet[2120]: E1213 02:05:25.890929 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.891451 kubelet[2120]: E1213 02:05:25.891430 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.891596 kubelet[2120]: W1213 02:05:25.891571 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.891711 kubelet[2120]: E1213 02:05:25.891695 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.892204 kubelet[2120]: E1213 02:05:25.892176 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.892345 kubelet[2120]: W1213 02:05:25.892325 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.892478 kubelet[2120]: E1213 02:05:25.892460 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.893770 kubelet[2120]: E1213 02:05:25.893701 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.893935 kubelet[2120]: W1213 02:05:25.893909 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.894066 kubelet[2120]: E1213 02:05:25.894046 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.894694 kubelet[2120]: E1213 02:05:25.894674 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.894834 kubelet[2120]: W1213 02:05:25.894815 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.894961 kubelet[2120]: E1213 02:05:25.894942 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.895441 kubelet[2120]: E1213 02:05:25.895422 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.895597 kubelet[2120]: W1213 02:05:25.895566 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.895717 kubelet[2120]: E1213 02:05:25.895698 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.896215 kubelet[2120]: E1213 02:05:25.896196 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.896347 kubelet[2120]: W1213 02:05:25.896329 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.896447 kubelet[2120]: E1213 02:05:25.896430 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.896579 kubelet[2120]: I1213 02:05:25.896559 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/fe43aeca-7618-49ba-af44-ec58d6fa89be-kubelet-dir\") pod \"csi-node-driver-25lng\" (UID: \"fe43aeca-7618-49ba-af44-ec58d6fa89be\") " pod="calico-system/csi-node-driver-25lng" Dec 13 02:05:25.897016 kubelet[2120]: E1213 02:05:25.897001 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.897566 kubelet[2120]: W1213 02:05:25.897545 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.897713 kubelet[2120]: E1213 02:05:25.897695 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.898158 kubelet[2120]: E1213 02:05:25.898084 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.898296 kubelet[2120]: W1213 02:05:25.898278 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.898398 kubelet[2120]: E1213 02:05:25.898384 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.898636 kubelet[2120]: I1213 02:05:25.898615 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-l8nlh\" (UniqueName: \"kubernetes.io/projected/fe43aeca-7618-49ba-af44-ec58d6fa89be-kube-api-access-l8nlh\") pod \"csi-node-driver-25lng\" (UID: \"fe43aeca-7618-49ba-af44-ec58d6fa89be\") " pod="calico-system/csi-node-driver-25lng" Dec 13 02:05:25.898780 kubelet[2120]: E1213 02:05:25.898753 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.898780 kubelet[2120]: W1213 02:05:25.898770 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.898913 kubelet[2120]: E1213 02:05:25.898786 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.899277 kubelet[2120]: E1213 02:05:25.899257 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.899277 kubelet[2120]: W1213 02:05:25.899275 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.899427 kubelet[2120]: E1213 02:05:25.899298 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.899732 kubelet[2120]: E1213 02:05:25.899693 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.899732 kubelet[2120]: W1213 02:05:25.899712 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.899904 kubelet[2120]: E1213 02:05:25.899734 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:25.900096 kubelet[2120]: E1213 02:05:25.900060 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:25.900096 kubelet[2120]: W1213 02:05:25.900078 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:25.900096 kubelet[2120]: E1213 02:05:25.900095 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.005171 kubelet[2120]: E1213 02:05:26.001582 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.005541 kubelet[2120]: W1213 02:05:26.005505 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.005711 kubelet[2120]: E1213 02:05:26.005689 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.008280 kubelet[2120]: E1213 02:05:26.008247 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.008504 kubelet[2120]: W1213 02:05:26.008478 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.008654 kubelet[2120]: E1213 02:05:26.008633 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.009214 kubelet[2120]: E1213 02:05:26.009192 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.009362 kubelet[2120]: W1213 02:05:26.009342 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.009491 kubelet[2120]: E1213 02:05:26.009473 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.010217 kubelet[2120]: E1213 02:05:26.010195 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.010361 kubelet[2120]: W1213 02:05:26.010341 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.010480 kubelet[2120]: E1213 02:05:26.010462 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.012251 kubelet[2120]: E1213 02:05:26.012230 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.012390 kubelet[2120]: W1213 02:05:26.012371 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.012493 kubelet[2120]: E1213 02:05:26.012475 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.012995 kubelet[2120]: E1213 02:05:26.012977 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.013257 kubelet[2120]: W1213 02:05:26.013237 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.013392 kubelet[2120]: E1213 02:05:26.013375 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.017873 kubelet[2120]: E1213 02:05:26.017843 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.018089 kubelet[2120]: W1213 02:05:26.018064 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.018250 kubelet[2120]: E1213 02:05:26.018231 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.018699 kubelet[2120]: E1213 02:05:26.018680 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.018831 kubelet[2120]: W1213 02:05:26.018812 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.018968 kubelet[2120]: E1213 02:05:26.018947 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.019379 kubelet[2120]: E1213 02:05:26.019360 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.019507 kubelet[2120]: W1213 02:05:26.019489 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.019631 kubelet[2120]: E1213 02:05:26.019614 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.020086 kubelet[2120]: E1213 02:05:26.020067 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.020261 kubelet[2120]: W1213 02:05:26.020240 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.020393 kubelet[2120]: E1213 02:05:26.020376 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.020800 kubelet[2120]: E1213 02:05:26.020782 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.020942 kubelet[2120]: W1213 02:05:26.020913 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.021062 kubelet[2120]: E1213 02:05:26.021044 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.022142 kubelet[2120]: E1213 02:05:26.021499 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.022142 kubelet[2120]: W1213 02:05:26.021520 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.022142 kubelet[2120]: E1213 02:05:26.021554 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.022142 kubelet[2120]: E1213 02:05:26.021854 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.022142 kubelet[2120]: W1213 02:05:26.021869 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.022476 kubelet[2120]: E1213 02:05:26.022154 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.022476 kubelet[2120]: W1213 02:05:26.022167 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.022476 kubelet[2120]: E1213 02:05:26.022206 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.022476 kubelet[2120]: E1213 02:05:26.022275 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.022690 kubelet[2120]: E1213 02:05:26.022581 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.022690 kubelet[2120]: W1213 02:05:26.022594 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.022850 kubelet[2120]: E1213 02:05:26.022827 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.023021 kubelet[2120]: E1213 02:05:26.022832 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.023135 kubelet[2120]: W1213 02:05:26.023022 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.023209 kubelet[2120]: E1213 02:05:26.023192 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.025649 kubelet[2120]: E1213 02:05:26.024013 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.025649 kubelet[2120]: W1213 02:05:26.024031 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.025649 kubelet[2120]: E1213 02:05:26.024052 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.025649 kubelet[2120]: E1213 02:05:26.024432 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.025649 kubelet[2120]: W1213 02:05:26.024447 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.025649 kubelet[2120]: E1213 02:05:26.024467 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.025649 kubelet[2120]: E1213 02:05:26.024770 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.025649 kubelet[2120]: W1213 02:05:26.024786 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.025649 kubelet[2120]: E1213 02:05:26.024895 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.025649 kubelet[2120]: E1213 02:05:26.025096 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.026320 kubelet[2120]: W1213 02:05:26.025142 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.026320 kubelet[2120]: E1213 02:05:26.025288 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.026320 kubelet[2120]: E1213 02:05:26.025474 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.026320 kubelet[2120]: W1213 02:05:26.025487 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.026320 kubelet[2120]: E1213 02:05:26.025635 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.026320 kubelet[2120]: E1213 02:05:26.025854 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.026320 kubelet[2120]: W1213 02:05:26.025867 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.026320 kubelet[2120]: E1213 02:05:26.025899 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.026784 kubelet[2120]: E1213 02:05:26.026518 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.026784 kubelet[2120]: W1213 02:05:26.026532 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.026784 kubelet[2120]: E1213 02:05:26.026646 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.026960 kubelet[2120]: E1213 02:05:26.026832 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.026960 kubelet[2120]: W1213 02:05:26.026843 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.027073 kubelet[2120]: E1213 02:05:26.026956 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.028494 kubelet[2120]: E1213 02:05:26.027208 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.028494 kubelet[2120]: W1213 02:05:26.027223 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.028494 kubelet[2120]: E1213 02:05:26.027333 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.028494 kubelet[2120]: E1213 02:05:26.027530 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.028494 kubelet[2120]: W1213 02:05:26.027542 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.028494 kubelet[2120]: E1213 02:05:26.027560 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.028494 kubelet[2120]: E1213 02:05:26.027864 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.028494 kubelet[2120]: W1213 02:05:26.027876 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.028494 kubelet[2120]: E1213 02:05:26.027894 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.031066 kubelet[2120]: E1213 02:05:26.031039 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.031066 kubelet[2120]: W1213 02:05:26.031063 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.031355 kubelet[2120]: E1213 02:05:26.031325 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.033268 kubelet[2120]: E1213 02:05:26.033243 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.033268 kubelet[2120]: W1213 02:05:26.033266 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.034024 kubelet[2120]: E1213 02:05:26.033992 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.045323 kubelet[2120]: E1213 02:05:26.045269 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.045323 kubelet[2120]: W1213 02:05:26.045314 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.045557 kubelet[2120]: E1213 02:05:26.045360 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.125768 kubelet[2120]: E1213 02:05:26.125731 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.126050 kubelet[2120]: W1213 02:05:26.126020 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.126245 kubelet[2120]: E1213 02:05:26.126220 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.126778 kubelet[2120]: E1213 02:05:26.126756 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.126940 kubelet[2120]: W1213 02:05:26.126918 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.127068 kubelet[2120]: E1213 02:05:26.127047 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.127584 kubelet[2120]: E1213 02:05:26.127563 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.127733 kubelet[2120]: W1213 02:05:26.127714 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.127864 kubelet[2120]: E1213 02:05:26.127846 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.128305 kubelet[2120]: E1213 02:05:26.128285 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.128449 kubelet[2120]: W1213 02:05:26.128430 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.128565 kubelet[2120]: E1213 02:05:26.128547 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.128972 kubelet[2120]: E1213 02:05:26.128953 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.129127 kubelet[2120]: W1213 02:05:26.129083 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.129274 kubelet[2120]: E1213 02:05:26.129254 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.129667 kubelet[2120]: E1213 02:05:26.129649 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.129812 kubelet[2120]: W1213 02:05:26.129793 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.129989 kubelet[2120]: E1213 02:05:26.129968 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.215914 kubelet[2120]: E1213 02:05:26.215879 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.216193 kubelet[2120]: W1213 02:05:26.216161 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.216339 kubelet[2120]: E1213 02:05:26.216318 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.217839 kubelet[2120]: E1213 02:05:26.217811 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.218065 kubelet[2120]: W1213 02:05:26.218041 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.218236 kubelet[2120]: E1213 02:05:26.218215 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.231465 kubelet[2120]: E1213 02:05:26.231428 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.231713 kubelet[2120]: W1213 02:05:26.231685 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.231870 kubelet[2120]: E1213 02:05:26.231846 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.232486 kubelet[2120]: E1213 02:05:26.232460 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.232673 kubelet[2120]: W1213 02:05:26.232649 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.232808 kubelet[2120]: E1213 02:05:26.232790 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.233324 kubelet[2120]: E1213 02:05:26.233304 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.233469 kubelet[2120]: W1213 02:05:26.233452 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.233593 kubelet[2120]: E1213 02:05:26.233566 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.234052 kubelet[2120]: E1213 02:05:26.234032 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.234256 kubelet[2120]: W1213 02:05:26.234218 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.234410 kubelet[2120]: E1213 02:05:26.234389 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.284380 kubelet[2120]: E1213 02:05:26.278866 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.284628 kubelet[2120]: W1213 02:05:26.284590 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.284781 kubelet[2120]: E1213 02:05:26.284758 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.304146 kubelet[2120]: E1213 02:05:26.299899 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.305671 kubelet[2120]: W1213 02:05:26.305638 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.310254 kubelet[2120]: E1213 02:05:26.310209 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.312942 kubelet[2120]: E1213 02:05:26.312232 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.312942 kubelet[2120]: W1213 02:05:26.312258 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.312942 kubelet[2120]: E1213 02:05:26.312284 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.335965 kubelet[2120]: E1213 02:05:26.335910 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.335965 kubelet[2120]: W1213 02:05:26.335956 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.336245 kubelet[2120]: E1213 02:05:26.335988 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.376000 audit[2617]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2617 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:26.376000 audit[2617]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffdb2644060 a2=0 a3=7ffdb264404c items=0 ppid=2267 pid=2617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:26.376000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:26.381000 audit[2617]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2617 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:26.381000 audit[2617]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdb2644060 a2=0 a3=0 items=0 ppid=2267 pid=2617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:26.381000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:26.435608 env[1236]: time="2024-12-13T02:05:26.435543226Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-ddmfn,Uid:06780d88-08f4-4d32-a928-20ba5afaf400,Namespace:calico-system,Attempt:0,}" Dec 13 02:05:26.437957 kubelet[2120]: E1213 02:05:26.437246 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.437957 kubelet[2120]: W1213 02:05:26.437274 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.437957 kubelet[2120]: E1213 02:05:26.437328 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.470545 env[1236]: time="2024-12-13T02:05:26.470440695Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:05:26.470835 env[1236]: time="2024-12-13T02:05:26.470790423Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:05:26.471030 env[1236]: time="2024-12-13T02:05:26.470990746Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:05:26.471406 env[1236]: time="2024-12-13T02:05:26.471357236Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/621bef6cec738c2be4a64e56496ac14b4a82f1e4b69be641606ca57c35aa5781 pid=2624 runtime=io.containerd.runc.v2 Dec 13 02:05:26.492683 systemd[1]: Started cri-containerd-621bef6cec738c2be4a64e56496ac14b4a82f1e4b69be641606ca57c35aa5781.scope. Dec 13 02:05:26.519780 kubelet[2120]: E1213 02:05:26.519731 2120 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:26.519780 kubelet[2120]: W1213 02:05:26.519763 2120 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:26.520045 kubelet[2120]: E1213 02:05:26.519790 2120 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:26.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.530000 audit: BPF prog-id=121 op=LOAD Dec 13 02:05:26.531000 audit[2635]: AVC avc: denied { bpf } for pid=2635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.531000 audit[2635]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2624 pid=2635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:26.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632316265663663656337333863326265346136346535363439366163 Dec 13 02:05:26.531000 audit[2635]: AVC avc: denied { perfmon } for pid=2635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.531000 audit[2635]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2624 pid=2635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:26.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632316265663663656337333863326265346136346535363439366163 Dec 13 02:05:26.531000 audit[2635]: AVC avc: denied { bpf } for pid=2635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.531000 audit[2635]: AVC avc: denied { bpf } for pid=2635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.531000 audit[2635]: AVC avc: denied { bpf } for pid=2635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.531000 audit[2635]: AVC avc: denied { perfmon } for pid=2635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.531000 audit[2635]: AVC avc: denied { perfmon } for pid=2635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.531000 audit[2635]: AVC avc: denied { perfmon } for pid=2635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.531000 audit[2635]: AVC avc: denied { perfmon } for pid=2635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.531000 audit[2635]: AVC avc: denied { perfmon } for pid=2635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.531000 audit[2635]: AVC avc: denied { bpf } for pid=2635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.531000 audit[2635]: AVC avc: denied { bpf } for pid=2635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.531000 audit: BPF prog-id=122 op=LOAD Dec 13 02:05:26.531000 audit[2635]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002affc0 items=0 ppid=2624 pid=2635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:26.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632316265663663656337333863326265346136346535363439366163 Dec 13 02:05:26.532000 audit[2635]: AVC avc: denied { bpf } for pid=2635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.532000 audit[2635]: AVC avc: denied { bpf } for pid=2635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.532000 audit[2635]: AVC avc: denied { perfmon } for pid=2635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.532000 audit[2635]: AVC avc: denied { perfmon } for pid=2635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.532000 audit[2635]: AVC avc: denied { perfmon } for pid=2635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.532000 audit[2635]: AVC avc: denied { perfmon } for pid=2635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.532000 audit[2635]: AVC avc: denied { perfmon } for pid=2635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.532000 audit[2635]: AVC avc: denied { bpf } for pid=2635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.532000 audit[2635]: AVC avc: denied { bpf } for pid=2635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.532000 audit: BPF prog-id=123 op=LOAD Dec 13 02:05:26.532000 audit[2635]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000386008 items=0 ppid=2624 pid=2635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:26.532000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632316265663663656337333863326265346136346535363439366163 Dec 13 02:05:26.536000 audit: BPF prog-id=123 op=UNLOAD Dec 13 02:05:26.536000 audit: BPF prog-id=122 op=UNLOAD Dec 13 02:05:26.536000 audit[2635]: AVC avc: denied { bpf } for pid=2635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.536000 audit[2635]: AVC avc: denied { bpf } for pid=2635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.536000 audit[2635]: AVC avc: denied { bpf } for pid=2635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.536000 audit[2635]: AVC avc: denied { perfmon } for pid=2635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.536000 audit[2635]: AVC avc: denied { perfmon } for pid=2635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.536000 audit[2635]: AVC avc: denied { perfmon } for pid=2635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.536000 audit[2635]: AVC avc: denied { perfmon } for pid=2635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.536000 audit[2635]: AVC avc: denied { perfmon } for pid=2635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.536000 audit[2635]: AVC avc: denied { bpf } for pid=2635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.536000 audit[2635]: AVC avc: denied { bpf } for pid=2635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.536000 audit: BPF prog-id=124 op=LOAD Dec 13 02:05:26.536000 audit[2635]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000386418 items=0 ppid=2624 pid=2635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:26.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632316265663663656337333863326265346136346535363439366163 Dec 13 02:05:26.559519 env[1236]: time="2024-12-13T02:05:26.559446830Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-ddmfn,Uid:06780d88-08f4-4d32-a928-20ba5afaf400,Namespace:calico-system,Attempt:0,} returns sandbox id \"621bef6cec738c2be4a64e56496ac14b4a82f1e4b69be641606ca57c35aa5781\"" Dec 13 02:05:26.564479 env[1236]: time="2024-12-13T02:05:26.564429499Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 02:05:26.587392 env[1236]: time="2024-12-13T02:05:26.587347523Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6f5775d44c-59t8d,Uid:f37c9b0d-5d66-44af-8053-eea90e783c17,Namespace:calico-system,Attempt:0,}" Dec 13 02:05:26.610928 env[1236]: time="2024-12-13T02:05:26.610799269Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:05:26.612158 env[1236]: time="2024-12-13T02:05:26.610936986Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:05:26.613286 env[1236]: time="2024-12-13T02:05:26.613194572Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:05:26.613729 env[1236]: time="2024-12-13T02:05:26.613615878Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a87e68123b85801f35cca1a9379d96b0de0c0325f8b47890ca58f00001cf4b6d pid=2667 runtime=io.containerd.runc.v2 Dec 13 02:05:26.636736 systemd[1]: Started cri-containerd-a87e68123b85801f35cca1a9379d96b0de0c0325f8b47890ca58f00001cf4b6d.scope. Dec 13 02:05:26.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.661000 audit: BPF prog-id=125 op=LOAD Dec 13 02:05:26.662000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.662000 audit[2677]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2667 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:26.662000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138376536383132336238353830316633356363613161393337396439 Dec 13 02:05:26.662000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.662000 audit[2677]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2667 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:26.662000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138376536383132336238353830316633356363613161393337396439 Dec 13 02:05:26.663000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.663000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.663000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.663000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.663000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.663000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.663000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.663000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.663000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.663000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.663000 audit: BPF prog-id=126 op=LOAD Dec 13 02:05:26.663000 audit[2677]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000024380 items=0 ppid=2667 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:26.663000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138376536383132336238353830316633356363613161393337396439 Dec 13 02:05:26.663000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.663000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.663000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.663000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.663000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.663000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.663000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.663000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.663000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.663000 audit: BPF prog-id=127 op=LOAD Dec 13 02:05:26.663000 audit[2677]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0000243c8 items=0 ppid=2667 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:26.663000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138376536383132336238353830316633356363613161393337396439 Dec 13 02:05:26.663000 audit: BPF prog-id=127 op=UNLOAD Dec 13 02:05:26.663000 audit: BPF prog-id=126 op=UNLOAD Dec 13 02:05:26.663000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.663000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.663000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.663000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.663000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.663000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.663000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.663000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.663000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.663000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:26.663000 audit: BPF prog-id=128 op=LOAD Dec 13 02:05:26.663000 audit[2677]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0000247d8 items=0 ppid=2667 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:26.663000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138376536383132336238353830316633356363613161393337396439 Dec 13 02:05:26.718291 env[1236]: time="2024-12-13T02:05:26.718244134Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6f5775d44c-59t8d,Uid:f37c9b0d-5d66-44af-8053-eea90e783c17,Namespace:calico-system,Attempt:0,} returns sandbox id \"a87e68123b85801f35cca1a9379d96b0de0c0325f8b47890ca58f00001cf4b6d\"" Dec 13 02:05:27.559301 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2606025213.mount: Deactivated successfully. Dec 13 02:05:27.743987 env[1236]: time="2024-12-13T02:05:27.743909322Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:27.747247 env[1236]: time="2024-12-13T02:05:27.747195750Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:27.749901 env[1236]: time="2024-12-13T02:05:27.749830786Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:27.752452 env[1236]: time="2024-12-13T02:05:27.752382133Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:27.753546 env[1236]: time="2024-12-13T02:05:27.753464426Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 02:05:27.756889 env[1236]: time="2024-12-13T02:05:27.756802904Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 02:05:27.760558 env[1236]: time="2024-12-13T02:05:27.760473289Z" level=info msg="CreateContainer within sandbox \"621bef6cec738c2be4a64e56496ac14b4a82f1e4b69be641606ca57c35aa5781\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 02:05:27.788603 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount256940580.mount: Deactivated successfully. Dec 13 02:05:27.799873 env[1236]: time="2024-12-13T02:05:27.799789224Z" level=info msg="CreateContainer within sandbox \"621bef6cec738c2be4a64e56496ac14b4a82f1e4b69be641606ca57c35aa5781\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"6802f3bc01518925a10dd1af348a8697653dc24304840900346352ff6a13a301\"" Dec 13 02:05:27.801514 env[1236]: time="2024-12-13T02:05:27.800597728Z" level=info msg="StartContainer for \"6802f3bc01518925a10dd1af348a8697653dc24304840900346352ff6a13a301\"" Dec 13 02:05:27.844426 systemd[1]: run-containerd-runc-k8s.io-6802f3bc01518925a10dd1af348a8697653dc24304840900346352ff6a13a301-runc.67uChS.mount: Deactivated successfully. Dec 13 02:05:27.851687 systemd[1]: Started cri-containerd-6802f3bc01518925a10dd1af348a8697653dc24304840900346352ff6a13a301.scope. Dec 13 02:05:27.876000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.876000 audit[2706]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f2971abf058 items=0 ppid=2624 pid=2706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:27.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638303266336263303135313839323561313064643161663334386138 Dec 13 02:05:27.876000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.876000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.876000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.876000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.876000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.876000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.876000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.876000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.876000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.876000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.876000 audit: BPF prog-id=129 op=LOAD Dec 13 02:05:27.876000 audit[2706]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003e86c8 items=0 ppid=2624 pid=2706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:27.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638303266336263303135313839323561313064643161663334386138 Dec 13 02:05:27.876000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.876000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.876000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.876000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.876000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.876000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.876000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.876000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.876000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.876000 audit: BPF prog-id=130 op=LOAD Dec 13 02:05:27.876000 audit[2706]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003e8718 items=0 ppid=2624 pid=2706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:27.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638303266336263303135313839323561313064643161663334386138 Dec 13 02:05:27.876000 audit: BPF prog-id=130 op=UNLOAD Dec 13 02:05:27.876000 audit: BPF prog-id=129 op=UNLOAD Dec 13 02:05:27.876000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.876000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.876000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.876000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.876000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.876000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.876000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.876000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.876000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.876000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.876000 audit: BPF prog-id=131 op=LOAD Dec 13 02:05:27.876000 audit[2706]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003e87a8 items=0 ppid=2624 pid=2706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:27.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638303266336263303135313839323561313064643161663334386138 Dec 13 02:05:27.905885 env[1236]: time="2024-12-13T02:05:27.905818818Z" level=info msg="StartContainer for \"6802f3bc01518925a10dd1af348a8697653dc24304840900346352ff6a13a301\" returns successfully" Dec 13 02:05:27.938942 systemd[1]: cri-containerd-6802f3bc01518925a10dd1af348a8697653dc24304840900346352ff6a13a301.scope: Deactivated successfully. Dec 13 02:05:27.943000 audit: BPF prog-id=131 op=UNLOAD Dec 13 02:05:28.242930 kubelet[2120]: E1213 02:05:28.242752 2120 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-25lng" podUID="fe43aeca-7618-49ba-af44-ec58d6fa89be" Dec 13 02:05:28.296131 env[1236]: time="2024-12-13T02:05:28.296050164Z" level=info msg="shim disconnected" id=6802f3bc01518925a10dd1af348a8697653dc24304840900346352ff6a13a301 Dec 13 02:05:28.296495 env[1236]: time="2024-12-13T02:05:28.296459236Z" level=warning msg="cleaning up after shim disconnected" id=6802f3bc01518925a10dd1af348a8697653dc24304840900346352ff6a13a301 namespace=k8s.io Dec 13 02:05:28.296646 env[1236]: time="2024-12-13T02:05:28.296621051Z" level=info msg="cleaning up dead shim" Dec 13 02:05:28.310228 env[1236]: time="2024-12-13T02:05:28.310171925Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:05:28Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2748 runtime=io.containerd.runc.v2\n" Dec 13 02:05:28.780875 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-6802f3bc01518925a10dd1af348a8697653dc24304840900346352ff6a13a301-rootfs.mount: Deactivated successfully. Dec 13 02:05:30.232732 env[1236]: time="2024-12-13T02:05:30.232092804Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:30.235787 env[1236]: time="2024-12-13T02:05:30.235730530Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:30.238540 env[1236]: time="2024-12-13T02:05:30.238479031Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:30.241663 env[1236]: time="2024-12-13T02:05:30.241595136Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:30.242940 kubelet[2120]: E1213 02:05:30.242526 2120 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-25lng" podUID="fe43aeca-7618-49ba-af44-ec58d6fa89be" Dec 13 02:05:30.243861 env[1236]: time="2024-12-13T02:05:30.243810492Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 02:05:30.248878 env[1236]: time="2024-12-13T02:05:30.248391657Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 02:05:30.259876 env[1236]: time="2024-12-13T02:05:30.259824428Z" level=info msg="CreateContainer within sandbox \"a87e68123b85801f35cca1a9379d96b0de0c0325f8b47890ca58f00001cf4b6d\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 02:05:30.288767 env[1236]: time="2024-12-13T02:05:30.288704879Z" level=info msg="CreateContainer within sandbox \"a87e68123b85801f35cca1a9379d96b0de0c0325f8b47890ca58f00001cf4b6d\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"0497e657404f10e117514b85d2a47789a8beb5e1135c9ac6d8163420d35a79ba\"" Dec 13 02:05:30.289934 env[1236]: time="2024-12-13T02:05:30.289875975Z" level=info msg="StartContainer for \"0497e657404f10e117514b85d2a47789a8beb5e1135c9ac6d8163420d35a79ba\"" Dec 13 02:05:30.371599 systemd[1]: Started cri-containerd-0497e657404f10e117514b85d2a47789a8beb5e1135c9ac6d8163420d35a79ba.scope. Dec 13 02:05:30.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.403242 kernel: kauditd_printk_skb: 166 callbacks suppressed Dec 13 02:05:30.403414 kernel: audit: type=1400 audit(1734055530.397:973): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.444445 kernel: audit: type=1400 audit(1734055530.397:974): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.467208 kernel: audit: type=1400 audit(1734055530.408:975): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.491165 kernel: audit: type=1400 audit(1734055530.408:976): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.512665 kernel: audit: type=1400 audit(1734055530.408:977): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.512766 kernel: audit: type=1400 audit(1734055530.408:978): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.554127 kernel: audit: type=1400 audit(1734055530.408:979): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.597281 kernel: audit: type=1400 audit(1734055530.408:980): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.597471 kernel: audit: type=1400 audit(1734055530.408:981): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.468000 audit: BPF prog-id=132 op=LOAD Dec 13 02:05:30.468000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.468000 audit[2774]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2667 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:30.622278 kernel: audit: type=1400 audit(1734055530.468:982): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034393765363537343034663130653131373531346238356432613437 Dec 13 02:05:30.468000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.468000 audit[2774]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2667 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:30.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034393765363537343034663130653131373531346238356432613437 Dec 13 02:05:30.468000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.468000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.468000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.468000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.468000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.468000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.468000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.468000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.468000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.468000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.468000 audit: BPF prog-id=133 op=LOAD Dec 13 02:05:30.468000 audit[2774]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003c23c0 items=0 ppid=2667 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:30.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034393765363537343034663130653131373531346238356432613437 Dec 13 02:05:30.490000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.490000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.490000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.490000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.490000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.490000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.490000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.490000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.490000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.490000 audit: BPF prog-id=134 op=LOAD Dec 13 02:05:30.490000 audit[2774]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003c2408 items=0 ppid=2667 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:30.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034393765363537343034663130653131373531346238356432613437 Dec 13 02:05:30.490000 audit: BPF prog-id=134 op=UNLOAD Dec 13 02:05:30.490000 audit: BPF prog-id=133 op=UNLOAD Dec 13 02:05:30.490000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.490000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.490000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.490000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.490000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.490000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.490000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.490000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.490000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.490000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:30.490000 audit: BPF prog-id=135 op=LOAD Dec 13 02:05:30.490000 audit[2774]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c2818 items=0 ppid=2667 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:30.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034393765363537343034663130653131373531346238356432613437 Dec 13 02:05:30.667741 env[1236]: time="2024-12-13T02:05:30.667676382Z" level=info msg="StartContainer for \"0497e657404f10e117514b85d2a47789a8beb5e1135c9ac6d8163420d35a79ba\" returns successfully" Dec 13 02:05:31.415133 kubelet[2120]: I1213 02:05:31.415039 2120 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-6f5775d44c-59t8d" podStartSLOduration=2.889277505 podStartE2EDuration="6.41499885s" podCreationTimestamp="2024-12-13 02:05:25 +0000 UTC" firstStartedPulling="2024-12-13 02:05:26.720518291 +0000 UTC m=+25.631069924" lastFinishedPulling="2024-12-13 02:05:30.246239645 +0000 UTC m=+29.156791269" observedRunningTime="2024-12-13 02:05:31.413619071 +0000 UTC m=+30.324170719" watchObservedRunningTime="2024-12-13 02:05:31.41499885 +0000 UTC m=+30.325550497" Dec 13 02:05:32.243533 kubelet[2120]: E1213 02:05:32.243473 2120 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-25lng" podUID="fe43aeca-7618-49ba-af44-ec58d6fa89be" Dec 13 02:05:32.351997 kubelet[2120]: I1213 02:05:32.351961 2120 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:05:34.242710 kubelet[2120]: E1213 02:05:34.242651 2120 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-25lng" podUID="fe43aeca-7618-49ba-af44-ec58d6fa89be" Dec 13 02:05:34.992632 env[1236]: time="2024-12-13T02:05:34.992524494Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:34.995340 env[1236]: time="2024-12-13T02:05:34.995291175Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:34.997928 env[1236]: time="2024-12-13T02:05:34.997880998Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:35.000535 env[1236]: time="2024-12-13T02:05:35.000458613Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:35.001673 env[1236]: time="2024-12-13T02:05:35.001613512Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 02:05:35.005889 env[1236]: time="2024-12-13T02:05:35.005838698Z" level=info msg="CreateContainer within sandbox \"621bef6cec738c2be4a64e56496ac14b4a82f1e4b69be641606ca57c35aa5781\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 02:05:35.030621 env[1236]: time="2024-12-13T02:05:35.030542155Z" level=info msg="CreateContainer within sandbox \"621bef6cec738c2be4a64e56496ac14b4a82f1e4b69be641606ca57c35aa5781\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"5ffca2bb79df58b6935ba14623d212535a26abb1ba2725f4bfb97c5d57378bb7\"" Dec 13 02:05:35.033290 env[1236]: time="2024-12-13T02:05:35.031427903Z" level=info msg="StartContainer for \"5ffca2bb79df58b6935ba14623d212535a26abb1ba2725f4bfb97c5d57378bb7\"" Dec 13 02:05:35.082265 systemd[1]: run-containerd-runc-k8s.io-5ffca2bb79df58b6935ba14623d212535a26abb1ba2725f4bfb97c5d57378bb7-runc.Px6WPF.mount: Deactivated successfully. Dec 13 02:05:35.086334 systemd[1]: Started cri-containerd-5ffca2bb79df58b6935ba14623d212535a26abb1ba2725f4bfb97c5d57378bb7.scope. Dec 13 02:05:35.106000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:35.106000 audit[2811]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f5d2c4f1d58 items=0 ppid=2624 pid=2811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:35.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566666361326262373964663538623639333562613134363233643231 Dec 13 02:05:35.106000 audit[2811]: AVC avc: denied { bpf } for pid=2811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:35.106000 audit[2811]: AVC avc: denied { bpf } for pid=2811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:35.106000 audit[2811]: AVC avc: denied { bpf } for pid=2811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:35.106000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:35.106000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:35.106000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:35.106000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:35.106000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:35.106000 audit[2811]: AVC avc: denied { bpf } for pid=2811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:35.106000 audit[2811]: AVC avc: denied { bpf } for pid=2811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:35.106000 audit: BPF prog-id=136 op=LOAD Dec 13 02:05:35.106000 audit[2811]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00027e898 items=0 ppid=2624 pid=2811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:35.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566666361326262373964663538623639333562613134363233643231 Dec 13 02:05:35.107000 audit[2811]: AVC avc: denied { bpf } for pid=2811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:35.107000 audit[2811]: AVC avc: denied { bpf } for pid=2811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:35.107000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:35.107000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:35.107000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:35.107000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:35.107000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:35.107000 audit[2811]: AVC avc: denied { bpf } for pid=2811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:35.107000 audit[2811]: AVC avc: denied { bpf } for pid=2811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:35.107000 audit: BPF prog-id=137 op=LOAD Dec 13 02:05:35.107000 audit[2811]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00027e8e8 items=0 ppid=2624 pid=2811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:35.107000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566666361326262373964663538623639333562613134363233643231 Dec 13 02:05:35.107000 audit: BPF prog-id=137 op=UNLOAD Dec 13 02:05:35.107000 audit: BPF prog-id=136 op=UNLOAD Dec 13 02:05:35.107000 audit[2811]: AVC avc: denied { bpf } for pid=2811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:35.107000 audit[2811]: AVC avc: denied { bpf } for pid=2811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:35.107000 audit[2811]: AVC avc: denied { bpf } for pid=2811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:35.107000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:35.107000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:35.107000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:35.107000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:35.107000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:35.107000 audit[2811]: AVC avc: denied { bpf } for pid=2811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:35.107000 audit[2811]: AVC avc: denied { bpf } for pid=2811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:35.107000 audit: BPF prog-id=138 op=LOAD Dec 13 02:05:35.107000 audit[2811]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00027e978 items=0 ppid=2624 pid=2811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:35.107000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566666361326262373964663538623639333562613134363233643231 Dec 13 02:05:35.127982 env[1236]: time="2024-12-13T02:05:35.127923285Z" level=info msg="StartContainer for \"5ffca2bb79df58b6935ba14623d212535a26abb1ba2725f4bfb97c5d57378bb7\" returns successfully" Dec 13 02:05:36.026466 env[1236]: time="2024-12-13T02:05:36.026380637Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 02:05:36.029907 systemd[1]: cri-containerd-5ffca2bb79df58b6935ba14623d212535a26abb1ba2725f4bfb97c5d57378bb7.scope: Deactivated successfully. Dec 13 02:05:36.043184 kernel: kauditd_printk_skb: 90 callbacks suppressed Dec 13 02:05:36.043351 kernel: audit: type=1334 audit(1734055536.033:997): prog-id=138 op=UNLOAD Dec 13 02:05:36.033000 audit: BPF prog-id=138 op=UNLOAD Dec 13 02:05:36.064933 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5ffca2bb79df58b6935ba14623d212535a26abb1ba2725f4bfb97c5d57378bb7-rootfs.mount: Deactivated successfully. Dec 13 02:05:36.131835 kubelet[2120]: I1213 02:05:36.130831 2120 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 02:05:36.165743 kubelet[2120]: I1213 02:05:36.164856 2120 topology_manager.go:215] "Topology Admit Handler" podUID="ab5406ea-be6d-43ba-ad0a-95a82cc144df" podNamespace="calico-system" podName="calico-kube-controllers-dbc6f5ff-k644c" Dec 13 02:05:36.174305 systemd[1]: Created slice kubepods-besteffort-podab5406ea_be6d_43ba_ad0a_95a82cc144df.slice. Dec 13 02:05:36.187646 kubelet[2120]: I1213 02:05:36.187596 2120 topology_manager.go:215] "Topology Admit Handler" podUID="c096b776-29d3-4474-9cfe-d2efcc213b0d" podNamespace="kube-system" podName="coredns-7db6d8ff4d-sc7rt" Dec 13 02:05:36.265590 kubelet[2120]: I1213 02:05:36.188271 2120 topology_manager.go:215] "Topology Admit Handler" podUID="1d1a3cd6-7ba6-4d29-a8c4-9d3e0364c3e8" podNamespace="kube-system" podName="coredns-7db6d8ff4d-xmdl8" Dec 13 02:05:36.265590 kubelet[2120]: I1213 02:05:36.188471 2120 topology_manager.go:215] "Topology Admit Handler" podUID="fe66513c-b2a4-427a-9ba0-77738873dfe3" podNamespace="calico-apiserver" podName="calico-apiserver-64b855cb6f-8p75j" Dec 13 02:05:36.265590 kubelet[2120]: I1213 02:05:36.192721 2120 topology_manager.go:215] "Topology Admit Handler" podUID="d1071b53-347f-4a14-9f06-84454932b905" podNamespace="calico-apiserver" podName="calico-apiserver-64b855cb6f-ttx6t" Dec 13 02:05:36.265590 kubelet[2120]: I1213 02:05:36.214655 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ab5406ea-be6d-43ba-ad0a-95a82cc144df-tigera-ca-bundle\") pod \"calico-kube-controllers-dbc6f5ff-k644c\" (UID: \"ab5406ea-be6d-43ba-ad0a-95a82cc144df\") " pod="calico-system/calico-kube-controllers-dbc6f5ff-k644c" Dec 13 02:05:36.265590 kubelet[2120]: I1213 02:05:36.214706 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kfjm9\" (UniqueName: \"kubernetes.io/projected/ab5406ea-be6d-43ba-ad0a-95a82cc144df-kube-api-access-kfjm9\") pod \"calico-kube-controllers-dbc6f5ff-k644c\" (UID: \"ab5406ea-be6d-43ba-ad0a-95a82cc144df\") " pod="calico-system/calico-kube-controllers-dbc6f5ff-k644c" Dec 13 02:05:36.210055 systemd[1]: Created slice kubepods-burstable-pod1d1a3cd6_7ba6_4d29_a8c4_9d3e0364c3e8.slice. Dec 13 02:05:36.220253 systemd[1]: Created slice kubepods-besteffort-podfe66513c_b2a4_427a_9ba0_77738873dfe3.slice. Dec 13 02:05:36.244968 systemd[1]: Created slice kubepods-besteffort-podd1071b53_347f_4a14_9f06_84454932b905.slice. Dec 13 02:05:36.265079 systemd[1]: Created slice kubepods-besteffort-podfe43aeca_7618_49ba_af44_ec58d6fa89be.slice. Dec 13 02:05:36.279187 env[1236]: time="2024-12-13T02:05:36.277457017Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-25lng,Uid:fe43aeca-7618-49ba-af44-ec58d6fa89be,Namespace:calico-system,Attempt:0,}" Dec 13 02:05:36.282468 systemd[1]: Created slice kubepods-burstable-podc096b776_29d3_4474_9cfe_d2efcc213b0d.slice. Dec 13 02:05:36.315505 kubelet[2120]: I1213 02:05:36.315438 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/fe66513c-b2a4-427a-9ba0-77738873dfe3-calico-apiserver-certs\") pod \"calico-apiserver-64b855cb6f-8p75j\" (UID: \"fe66513c-b2a4-427a-9ba0-77738873dfe3\") " pod="calico-apiserver/calico-apiserver-64b855cb6f-8p75j" Dec 13 02:05:36.315781 kubelet[2120]: I1213 02:05:36.315519 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wbjmz\" (UniqueName: \"kubernetes.io/projected/d1071b53-347f-4a14-9f06-84454932b905-kube-api-access-wbjmz\") pod \"calico-apiserver-64b855cb6f-ttx6t\" (UID: \"d1071b53-347f-4a14-9f06-84454932b905\") " pod="calico-apiserver/calico-apiserver-64b855cb6f-ttx6t" Dec 13 02:05:36.315781 kubelet[2120]: I1213 02:05:36.315551 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/1d1a3cd6-7ba6-4d29-a8c4-9d3e0364c3e8-config-volume\") pod \"coredns-7db6d8ff4d-xmdl8\" (UID: \"1d1a3cd6-7ba6-4d29-a8c4-9d3e0364c3e8\") " pod="kube-system/coredns-7db6d8ff4d-xmdl8" Dec 13 02:05:36.315781 kubelet[2120]: I1213 02:05:36.315620 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/d1071b53-347f-4a14-9f06-84454932b905-calico-apiserver-certs\") pod \"calico-apiserver-64b855cb6f-ttx6t\" (UID: \"d1071b53-347f-4a14-9f06-84454932b905\") " pod="calico-apiserver/calico-apiserver-64b855cb6f-ttx6t" Dec 13 02:05:36.315781 kubelet[2120]: I1213 02:05:36.315652 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2b5dq\" (UniqueName: \"kubernetes.io/projected/1d1a3cd6-7ba6-4d29-a8c4-9d3e0364c3e8-kube-api-access-2b5dq\") pod \"coredns-7db6d8ff4d-xmdl8\" (UID: \"1d1a3cd6-7ba6-4d29-a8c4-9d3e0364c3e8\") " pod="kube-system/coredns-7db6d8ff4d-xmdl8" Dec 13 02:05:36.315781 kubelet[2120]: I1213 02:05:36.315685 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tjlvv\" (UniqueName: \"kubernetes.io/projected/fe66513c-b2a4-427a-9ba0-77738873dfe3-kube-api-access-tjlvv\") pod \"calico-apiserver-64b855cb6f-8p75j\" (UID: \"fe66513c-b2a4-427a-9ba0-77738873dfe3\") " pod="calico-apiserver/calico-apiserver-64b855cb6f-8p75j" Dec 13 02:05:36.316143 kubelet[2120]: I1213 02:05:36.315713 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zbgf4\" (UniqueName: \"kubernetes.io/projected/c096b776-29d3-4474-9cfe-d2efcc213b0d-kube-api-access-zbgf4\") pod \"coredns-7db6d8ff4d-sc7rt\" (UID: \"c096b776-29d3-4474-9cfe-d2efcc213b0d\") " pod="kube-system/coredns-7db6d8ff4d-sc7rt" Dec 13 02:05:36.316143 kubelet[2120]: I1213 02:05:36.315742 2120 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/c096b776-29d3-4474-9cfe-d2efcc213b0d-config-volume\") pod \"coredns-7db6d8ff4d-sc7rt\" (UID: \"c096b776-29d3-4474-9cfe-d2efcc213b0d\") " pod="kube-system/coredns-7db6d8ff4d-sc7rt" Dec 13 02:05:36.487148 env[1236]: time="2024-12-13T02:05:36.486716356Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-dbc6f5ff-k644c,Uid:ab5406ea-be6d-43ba-ad0a-95a82cc144df,Namespace:calico-system,Attempt:0,}" Dec 13 02:05:36.570735 env[1236]: time="2024-12-13T02:05:36.570656669Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-64b855cb6f-8p75j,Uid:fe66513c-b2a4-427a-9ba0-77738873dfe3,Namespace:calico-apiserver,Attempt:0,}" Dec 13 02:05:36.578250 env[1236]: time="2024-12-13T02:05:36.578181955Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-xmdl8,Uid:1d1a3cd6-7ba6-4d29-a8c4-9d3e0364c3e8,Namespace:kube-system,Attempt:0,}" Dec 13 02:05:36.578534 env[1236]: time="2024-12-13T02:05:36.578182109Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-64b855cb6f-ttx6t,Uid:d1071b53-347f-4a14-9f06-84454932b905,Namespace:calico-apiserver,Attempt:0,}" Dec 13 02:05:36.588959 env[1236]: time="2024-12-13T02:05:36.588902250Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-sc7rt,Uid:c096b776-29d3-4474-9cfe-d2efcc213b0d,Namespace:kube-system,Attempt:0,}" Dec 13 02:05:37.113502 env[1236]: time="2024-12-13T02:05:37.113434467Z" level=info msg="shim disconnected" id=5ffca2bb79df58b6935ba14623d212535a26abb1ba2725f4bfb97c5d57378bb7 Dec 13 02:05:37.114224 env[1236]: time="2024-12-13T02:05:37.114161672Z" level=warning msg="cleaning up after shim disconnected" id=5ffca2bb79df58b6935ba14623d212535a26abb1ba2725f4bfb97c5d57378bb7 namespace=k8s.io Dec 13 02:05:37.114224 env[1236]: time="2024-12-13T02:05:37.114197710Z" level=info msg="cleaning up dead shim" Dec 13 02:05:37.131647 env[1236]: time="2024-12-13T02:05:37.131574369Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:05:37Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2857 runtime=io.containerd.runc.v2\n" Dec 13 02:05:37.373830 env[1236]: time="2024-12-13T02:05:37.371718342Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 02:05:37.466511 env[1236]: time="2024-12-13T02:05:37.466430909Z" level=error msg="Failed to destroy network for sandbox \"b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:37.466998 env[1236]: time="2024-12-13T02:05:37.466939826Z" level=error msg="encountered an error cleaning up failed sandbox \"b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:37.467199 env[1236]: time="2024-12-13T02:05:37.467027787Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-64b855cb6f-8p75j,Uid:fe66513c-b2a4-427a-9ba0-77738873dfe3,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:37.467387 kubelet[2120]: E1213 02:05:37.467314 2120 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:37.467920 kubelet[2120]: E1213 02:05:37.467398 2120 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-64b855cb6f-8p75j" Dec 13 02:05:37.467920 kubelet[2120]: E1213 02:05:37.467428 2120 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-64b855cb6f-8p75j" Dec 13 02:05:37.467920 kubelet[2120]: E1213 02:05:37.467490 2120 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-64b855cb6f-8p75j_calico-apiserver(fe66513c-b2a4-427a-9ba0-77738873dfe3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-64b855cb6f-8p75j_calico-apiserver(fe66513c-b2a4-427a-9ba0-77738873dfe3)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-64b855cb6f-8p75j" podUID="fe66513c-b2a4-427a-9ba0-77738873dfe3" Dec 13 02:05:37.510368 env[1236]: time="2024-12-13T02:05:37.510284118Z" level=error msg="Failed to destroy network for sandbox \"f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:37.510872 env[1236]: time="2024-12-13T02:05:37.510813215Z" level=error msg="encountered an error cleaning up failed sandbox \"f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:37.511028 env[1236]: time="2024-12-13T02:05:37.510906725Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-sc7rt,Uid:c096b776-29d3-4474-9cfe-d2efcc213b0d,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:37.514025 kubelet[2120]: E1213 02:05:37.511412 2120 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:37.514025 kubelet[2120]: E1213 02:05:37.511515 2120 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-sc7rt" Dec 13 02:05:37.514025 kubelet[2120]: E1213 02:05:37.511571 2120 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-sc7rt" Dec 13 02:05:37.514395 kubelet[2120]: E1213 02:05:37.511688 2120 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-sc7rt_kube-system(c096b776-29d3-4474-9cfe-d2efcc213b0d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-sc7rt_kube-system(c096b776-29d3-4474-9cfe-d2efcc213b0d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-sc7rt" podUID="c096b776-29d3-4474-9cfe-d2efcc213b0d" Dec 13 02:05:37.559529 env[1236]: time="2024-12-13T02:05:37.559446203Z" level=error msg="Failed to destroy network for sandbox \"07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:37.560256 env[1236]: time="2024-12-13T02:05:37.560185688Z" level=error msg="encountered an error cleaning up failed sandbox \"07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:37.560546 env[1236]: time="2024-12-13T02:05:37.560497137Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-64b855cb6f-ttx6t,Uid:d1071b53-347f-4a14-9f06-84454932b905,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:37.562573 kubelet[2120]: E1213 02:05:37.561967 2120 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:37.562573 kubelet[2120]: E1213 02:05:37.562055 2120 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-64b855cb6f-ttx6t" Dec 13 02:05:37.562573 kubelet[2120]: E1213 02:05:37.562086 2120 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-64b855cb6f-ttx6t" Dec 13 02:05:37.564576 kubelet[2120]: E1213 02:05:37.562190 2120 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-64b855cb6f-ttx6t_calico-apiserver(d1071b53-347f-4a14-9f06-84454932b905)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-64b855cb6f-ttx6t_calico-apiserver(d1071b53-347f-4a14-9f06-84454932b905)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-64b855cb6f-ttx6t" podUID="d1071b53-347f-4a14-9f06-84454932b905" Dec 13 02:05:37.581525 env[1236]: time="2024-12-13T02:05:37.581436609Z" level=error msg="Failed to destroy network for sandbox \"23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:37.581981 env[1236]: time="2024-12-13T02:05:37.581922575Z" level=error msg="encountered an error cleaning up failed sandbox \"23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:37.582252 env[1236]: time="2024-12-13T02:05:37.582190204Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-dbc6f5ff-k644c,Uid:ab5406ea-be6d-43ba-ad0a-95a82cc144df,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:37.583036 kubelet[2120]: E1213 02:05:37.582649 2120 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:37.583036 kubelet[2120]: E1213 02:05:37.582774 2120 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-dbc6f5ff-k644c" Dec 13 02:05:37.583036 kubelet[2120]: E1213 02:05:37.582804 2120 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-dbc6f5ff-k644c" Dec 13 02:05:37.584952 kubelet[2120]: E1213 02:05:37.582932 2120 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-dbc6f5ff-k644c_calico-system(ab5406ea-be6d-43ba-ad0a-95a82cc144df)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-dbc6f5ff-k644c_calico-system(ab5406ea-be6d-43ba-ad0a-95a82cc144df)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-dbc6f5ff-k644c" podUID="ab5406ea-be6d-43ba-ad0a-95a82cc144df" Dec 13 02:05:37.589163 env[1236]: time="2024-12-13T02:05:37.589069874Z" level=error msg="Failed to destroy network for sandbox \"e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:37.589758 env[1236]: time="2024-12-13T02:05:37.589701589Z" level=error msg="encountered an error cleaning up failed sandbox \"e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:37.589984 env[1236]: time="2024-12-13T02:05:37.589938771Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-25lng,Uid:fe43aeca-7618-49ba-af44-ec58d6fa89be,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:37.590903 kubelet[2120]: E1213 02:05:37.590558 2120 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:37.590903 kubelet[2120]: E1213 02:05:37.590664 2120 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-25lng" Dec 13 02:05:37.590903 kubelet[2120]: E1213 02:05:37.590720 2120 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-25lng" Dec 13 02:05:37.591228 kubelet[2120]: E1213 02:05:37.590833 2120 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-25lng_calico-system(fe43aeca-7618-49ba-af44-ec58d6fa89be)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-25lng_calico-system(fe43aeca-7618-49ba-af44-ec58d6fa89be)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-25lng" podUID="fe43aeca-7618-49ba-af44-ec58d6fa89be" Dec 13 02:05:37.610279 env[1236]: time="2024-12-13T02:05:37.610163268Z" level=error msg="Failed to destroy network for sandbox \"3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:37.610754 env[1236]: time="2024-12-13T02:05:37.610682528Z" level=error msg="encountered an error cleaning up failed sandbox \"3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:37.610901 env[1236]: time="2024-12-13T02:05:37.610763214Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-xmdl8,Uid:1d1a3cd6-7ba6-4d29-a8c4-9d3e0364c3e8,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:37.611135 kubelet[2120]: E1213 02:05:37.611065 2120 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:37.611285 kubelet[2120]: E1213 02:05:37.611168 2120 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-xmdl8" Dec 13 02:05:37.611285 kubelet[2120]: E1213 02:05:37.611202 2120 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-xmdl8" Dec 13 02:05:37.611516 kubelet[2120]: E1213 02:05:37.611267 2120 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-xmdl8_kube-system(1d1a3cd6-7ba6-4d29-a8c4-9d3e0364c3e8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-xmdl8_kube-system(1d1a3cd6-7ba6-4d29-a8c4-9d3e0364c3e8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-xmdl8" podUID="1d1a3cd6-7ba6-4d29-a8c4-9d3e0364c3e8" Dec 13 02:05:38.066680 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4-shm.mount: Deactivated successfully. Dec 13 02:05:38.066839 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1-shm.mount: Deactivated successfully. Dec 13 02:05:38.066950 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd-shm.mount: Deactivated successfully. Dec 13 02:05:38.067046 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c-shm.mount: Deactivated successfully. Dec 13 02:05:38.067156 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79-shm.mount: Deactivated successfully. Dec 13 02:05:38.380441 kubelet[2120]: I1213 02:05:38.376801 2120 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2" Dec 13 02:05:38.380967 env[1236]: time="2024-12-13T02:05:38.380910869Z" level=info msg="StopPodSandbox for \"f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2\"" Dec 13 02:05:38.399155 kubelet[2120]: I1213 02:05:38.398089 2120 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd" Dec 13 02:05:38.399726 env[1236]: time="2024-12-13T02:05:38.399675387Z" level=info msg="StopPodSandbox for \"b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd\"" Dec 13 02:05:38.426628 kubelet[2120]: I1213 02:05:38.425270 2120 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79" Dec 13 02:05:38.427145 env[1236]: time="2024-12-13T02:05:38.427070806Z" level=info msg="StopPodSandbox for \"23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79\"" Dec 13 02:05:38.438975 kubelet[2120]: I1213 02:05:38.438588 2120 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4" Dec 13 02:05:38.440940 env[1236]: time="2024-12-13T02:05:38.440893864Z" level=info msg="StopPodSandbox for \"07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4\"" Dec 13 02:05:38.444711 kubelet[2120]: I1213 02:05:38.443993 2120 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c" Dec 13 02:05:38.451271 env[1236]: time="2024-12-13T02:05:38.451199970Z" level=info msg="StopPodSandbox for \"e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c\"" Dec 13 02:05:38.470806 kubelet[2120]: I1213 02:05:38.469685 2120 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1" Dec 13 02:05:38.484792 env[1236]: time="2024-12-13T02:05:38.484737000Z" level=info msg="StopPodSandbox for \"3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1\"" Dec 13 02:05:38.585124 env[1236]: time="2024-12-13T02:05:38.585026405Z" level=error msg="StopPodSandbox for \"f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2\" failed" error="failed to destroy network for sandbox \"f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:38.585477 kubelet[2120]: E1213 02:05:38.585412 2120 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2" Dec 13 02:05:38.585602 kubelet[2120]: E1213 02:05:38.585523 2120 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2"} Dec 13 02:05:38.585666 kubelet[2120]: E1213 02:05:38.585635 2120 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c096b776-29d3-4474-9cfe-d2efcc213b0d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:05:38.585783 kubelet[2120]: E1213 02:05:38.585694 2120 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c096b776-29d3-4474-9cfe-d2efcc213b0d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-sc7rt" podUID="c096b776-29d3-4474-9cfe-d2efcc213b0d" Dec 13 02:05:38.625393 env[1236]: time="2024-12-13T02:05:38.625311424Z" level=error msg="StopPodSandbox for \"b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd\" failed" error="failed to destroy network for sandbox \"b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:38.625778 kubelet[2120]: E1213 02:05:38.625711 2120 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd" Dec 13 02:05:38.625920 kubelet[2120]: E1213 02:05:38.625843 2120 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd"} Dec 13 02:05:38.626002 kubelet[2120]: E1213 02:05:38.625913 2120 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"fe66513c-b2a4-427a-9ba0-77738873dfe3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:05:38.626002 kubelet[2120]: E1213 02:05:38.625967 2120 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"fe66513c-b2a4-427a-9ba0-77738873dfe3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-64b855cb6f-8p75j" podUID="fe66513c-b2a4-427a-9ba0-77738873dfe3" Dec 13 02:05:38.643090 env[1236]: time="2024-12-13T02:05:38.641403849Z" level=error msg="StopPodSandbox for \"23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79\" failed" error="failed to destroy network for sandbox \"23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:38.643272 kubelet[2120]: E1213 02:05:38.641745 2120 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79" Dec 13 02:05:38.643272 kubelet[2120]: E1213 02:05:38.641888 2120 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79"} Dec 13 02:05:38.643272 kubelet[2120]: E1213 02:05:38.641963 2120 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ab5406ea-be6d-43ba-ad0a-95a82cc144df\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:05:38.643272 kubelet[2120]: E1213 02:05:38.642009 2120 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ab5406ea-be6d-43ba-ad0a-95a82cc144df\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-dbc6f5ff-k644c" podUID="ab5406ea-be6d-43ba-ad0a-95a82cc144df" Dec 13 02:05:38.664023 env[1236]: time="2024-12-13T02:05:38.663946015Z" level=error msg="StopPodSandbox for \"e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c\" failed" error="failed to destroy network for sandbox \"e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:38.664710 kubelet[2120]: E1213 02:05:38.664508 2120 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c" Dec 13 02:05:38.664710 kubelet[2120]: E1213 02:05:38.664571 2120 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c"} Dec 13 02:05:38.664710 kubelet[2120]: E1213 02:05:38.664628 2120 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"fe43aeca-7618-49ba-af44-ec58d6fa89be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:05:38.664710 kubelet[2120]: E1213 02:05:38.664664 2120 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"fe43aeca-7618-49ba-af44-ec58d6fa89be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-25lng" podUID="fe43aeca-7618-49ba-af44-ec58d6fa89be" Dec 13 02:05:38.681557 env[1236]: time="2024-12-13T02:05:38.681484436Z" level=error msg="StopPodSandbox for \"07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4\" failed" error="failed to destroy network for sandbox \"07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:38.682283 kubelet[2120]: E1213 02:05:38.682056 2120 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4" Dec 13 02:05:38.682283 kubelet[2120]: E1213 02:05:38.682148 2120 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4"} Dec 13 02:05:38.682283 kubelet[2120]: E1213 02:05:38.682200 2120 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d1071b53-347f-4a14-9f06-84454932b905\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:05:38.682283 kubelet[2120]: E1213 02:05:38.682241 2120 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d1071b53-347f-4a14-9f06-84454932b905\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-64b855cb6f-ttx6t" podUID="d1071b53-347f-4a14-9f06-84454932b905" Dec 13 02:05:38.684017 env[1236]: time="2024-12-13T02:05:38.683953234Z" level=error msg="StopPodSandbox for \"3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1\" failed" error="failed to destroy network for sandbox \"3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:38.684603 kubelet[2120]: E1213 02:05:38.684396 2120 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1" Dec 13 02:05:38.684603 kubelet[2120]: E1213 02:05:38.684456 2120 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1"} Dec 13 02:05:38.684603 kubelet[2120]: E1213 02:05:38.684503 2120 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1d1a3cd6-7ba6-4d29-a8c4-9d3e0364c3e8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:05:38.684603 kubelet[2120]: E1213 02:05:38.684539 2120 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1d1a3cd6-7ba6-4d29-a8c4-9d3e0364c3e8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-xmdl8" podUID="1d1a3cd6-7ba6-4d29-a8c4-9d3e0364c3e8" Dec 13 02:05:44.768630 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2456395688.mount: Deactivated successfully. Dec 13 02:05:44.818220 env[1236]: time="2024-12-13T02:05:44.818127515Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:44.820977 env[1236]: time="2024-12-13T02:05:44.820898970Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:44.823450 env[1236]: time="2024-12-13T02:05:44.823397838Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:44.825999 env[1236]: time="2024-12-13T02:05:44.825951711Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:44.826831 env[1236]: time="2024-12-13T02:05:44.826784493Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 02:05:44.856272 env[1236]: time="2024-12-13T02:05:44.856217860Z" level=info msg="CreateContainer within sandbox \"621bef6cec738c2be4a64e56496ac14b4a82f1e4b69be641606ca57c35aa5781\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 02:05:44.883427 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2521254949.mount: Deactivated successfully. Dec 13 02:05:44.888189 env[1236]: time="2024-12-13T02:05:44.888094893Z" level=info msg="CreateContainer within sandbox \"621bef6cec738c2be4a64e56496ac14b4a82f1e4b69be641606ca57c35aa5781\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"6ed3452c5b5a4793680bd922c9e9bebb39e3172741e5bd0529ab4c55940322f9\"" Dec 13 02:05:44.890499 env[1236]: time="2024-12-13T02:05:44.889546056Z" level=info msg="StartContainer for \"6ed3452c5b5a4793680bd922c9e9bebb39e3172741e5bd0529ab4c55940322f9\"" Dec 13 02:05:44.915207 systemd[1]: Started cri-containerd-6ed3452c5b5a4793680bd922c9e9bebb39e3172741e5bd0529ab4c55940322f9.scope. Dec 13 02:05:44.941000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:44.972237 kernel: audit: type=1400 audit(1734055544.941:998): avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:44.972412 kernel: audit: type=1300 audit(1734055544.941:998): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f443319d898 items=0 ppid=2624 pid=3199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:44.941000 audit[3199]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f443319d898 items=0 ppid=2624 pid=3199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:45.026030 kernel: audit: type=1327 audit(1734055544.941:998): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665643334353263356235613437393336383062643932326339653962 Dec 13 02:05:44.941000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665643334353263356235613437393336383062643932326339653962 Dec 13 02:05:45.027559 env[1236]: time="2024-12-13T02:05:45.027056007Z" level=info msg="StartContainer for \"6ed3452c5b5a4793680bd922c9e9bebb39e3172741e5bd0529ab4c55940322f9\" returns successfully" Dec 13 02:05:44.941000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:44.941000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:45.049235 kernel: audit: type=1400 audit(1734055544.941:999): avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:45.049340 kernel: audit: type=1400 audit(1734055544.941:999): avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:44.941000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:45.090165 kernel: audit: type=1400 audit(1734055544.941:999): avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:44.941000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:45.114240 kernel: audit: type=1400 audit(1734055544.941:999): avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:44.941000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:44.941000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:45.156824 kernel: audit: type=1400 audit(1734055544.941:999): avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:45.157007 kernel: audit: type=1400 audit(1734055544.941:999): avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:45.157057 kernel: audit: type=1400 audit(1734055544.941:999): avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:44.941000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:44.941000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:44.941000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:44.941000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:44.941000 audit: BPF prog-id=139 op=LOAD Dec 13 02:05:44.941000 audit[3199]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003dc108 items=0 ppid=2624 pid=3199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:44.941000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665643334353263356235613437393336383062643932326339653962 Dec 13 02:05:44.942000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:44.942000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:44.942000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:44.942000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:44.942000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:44.942000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:44.942000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:44.942000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:44.942000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:44.942000 audit: BPF prog-id=140 op=LOAD Dec 13 02:05:44.942000 audit[3199]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003dc158 items=0 ppid=2624 pid=3199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:44.942000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665643334353263356235613437393336383062643932326339653962 Dec 13 02:05:44.942000 audit: BPF prog-id=140 op=UNLOAD Dec 13 02:05:44.942000 audit: BPF prog-id=139 op=UNLOAD Dec 13 02:05:44.942000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:44.942000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:44.942000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:44.942000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:44.942000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:44.942000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:44.942000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:44.942000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:44.942000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:44.942000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:44.942000 audit: BPF prog-id=141 op=LOAD Dec 13 02:05:44.942000 audit[3199]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003dc1e8 items=0 ppid=2624 pid=3199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:44.942000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665643334353263356235613437393336383062643932326339653962 Dec 13 02:05:45.247746 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 02:05:45.247933 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 02:05:46.630000 audit[3287]: AVC avc: denied { write } for pid=3287 comm="tee" name="fd" dev="proc" ino=24193 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:05:46.630000 audit[3287]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcc32dc9ca a2=241 a3=1b6 items=1 ppid=3264 pid=3287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:46.630000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 02:05:46.630000 audit: PATH item=0 name="/dev/fd/63" inode=24747 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:46.630000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:05:46.639000 audit[3302]: AVC avc: denied { write } for pid=3302 comm="tee" name="fd" dev="proc" ino=24199 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:05:46.641000 audit[3310]: AVC avc: denied { write } for pid=3310 comm="tee" name="fd" dev="proc" ino=24202 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:05:46.652000 audit[3304]: AVC avc: denied { write } for pid=3304 comm="tee" name="fd" dev="proc" ino=24209 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:05:46.639000 audit[3302]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffef4a5e9b9 a2=241 a3=1b6 items=1 ppid=3267 pid=3302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:46.639000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 02:05:46.639000 audit: PATH item=0 name="/dev/fd/63" inode=24182 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:46.639000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:05:46.641000 audit[3310]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcf0f7b9c8 a2=241 a3=1b6 items=1 ppid=3272 pid=3310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:46.641000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 02:05:46.641000 audit: PATH item=0 name="/dev/fd/63" inode=24190 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:46.641000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:05:46.652000 audit[3304]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdb422a9c8 a2=241 a3=1b6 items=1 ppid=3273 pid=3304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:46.652000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 02:05:46.652000 audit: PATH item=0 name="/dev/fd/63" inode=24185 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:46.652000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:05:46.676000 audit[3325]: AVC avc: denied { write } for pid=3325 comm="tee" name="fd" dev="proc" ino=24223 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:05:46.677000 audit[3318]: AVC avc: denied { write } for pid=3318 comm="tee" name="fd" dev="proc" ino=24779 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:05:46.677000 audit[3318]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffdb6bd9b8 a2=241 a3=1b6 items=1 ppid=3278 pid=3318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:46.677000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 02:05:46.677000 audit: PATH item=0 name="/dev/fd/63" inode=24212 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:46.677000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:05:46.676000 audit[3325]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffcace39c9 a2=241 a3=1b6 items=1 ppid=3266 pid=3325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:46.676000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 02:05:46.676000 audit: PATH item=0 name="/dev/fd/63" inode=24216 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:46.676000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:05:46.674000 audit[3323]: AVC avc: denied { write } for pid=3323 comm="tee" name="fd" dev="proc" ino=24226 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:05:46.674000 audit[3323]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd7fe2e9c8 a2=241 a3=1b6 items=1 ppid=3268 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:46.674000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 02:05:46.674000 audit: PATH item=0 name="/dev/fd/63" inode=24213 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:46.674000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:05:48.613873 kubelet[2120]: I1213 02:05:48.612606 2120 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:05:48.641573 systemd[1]: run-containerd-runc-k8s.io-6ed3452c5b5a4793680bd922c9e9bebb39e3172741e5bd0529ab4c55940322f9-runc.2nsp5c.mount: Deactivated successfully. Dec 13 02:05:48.736796 systemd[1]: run-containerd-runc-k8s.io-6ed3452c5b5a4793680bd922c9e9bebb39e3172741e5bd0529ab4c55940322f9-runc.GBWkzp.mount: Deactivated successfully. Dec 13 02:05:50.243597 env[1236]: time="2024-12-13T02:05:50.243535456Z" level=info msg="StopPodSandbox for \"e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c\"" Dec 13 02:05:50.245300 env[1236]: time="2024-12-13T02:05:50.244502838Z" level=info msg="StopPodSandbox for \"3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1\"" Dec 13 02:05:50.245944 env[1236]: time="2024-12-13T02:05:50.244560245Z" level=info msg="StopPodSandbox for \"23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79\"" Dec 13 02:05:50.360827 kubelet[2120]: I1213 02:05:50.360728 2120 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-ddmfn" podStartSLOduration=7.095747897 podStartE2EDuration="25.360667272s" podCreationTimestamp="2024-12-13 02:05:25 +0000 UTC" firstStartedPulling="2024-12-13 02:05:26.564009106 +0000 UTC m=+25.474560736" lastFinishedPulling="2024-12-13 02:05:44.828928472 +0000 UTC m=+43.739480111" observedRunningTime="2024-12-13 02:05:45.513686666 +0000 UTC m=+44.424238318" watchObservedRunningTime="2024-12-13 02:05:50.360667272 +0000 UTC m=+49.271218922" Dec 13 02:05:50.448966 env[1236]: 2024-12-13 02:05:50.362 [INFO][3497] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1" Dec 13 02:05:50.448966 env[1236]: 2024-12-13 02:05:50.362 [INFO][3497] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1" iface="eth0" netns="/var/run/netns/cni-8d763a71-6865-6359-7ea3-8400100236a1" Dec 13 02:05:50.448966 env[1236]: 2024-12-13 02:05:50.362 [INFO][3497] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1" iface="eth0" netns="/var/run/netns/cni-8d763a71-6865-6359-7ea3-8400100236a1" Dec 13 02:05:50.448966 env[1236]: 2024-12-13 02:05:50.363 [INFO][3497] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1" iface="eth0" netns="/var/run/netns/cni-8d763a71-6865-6359-7ea3-8400100236a1" Dec 13 02:05:50.448966 env[1236]: 2024-12-13 02:05:50.363 [INFO][3497] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1" Dec 13 02:05:50.448966 env[1236]: 2024-12-13 02:05:50.363 [INFO][3497] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1" Dec 13 02:05:50.448966 env[1236]: 2024-12-13 02:05:50.430 [INFO][3518] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1" HandleID="k8s-pod-network.3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xmdl8-eth0" Dec 13 02:05:50.448966 env[1236]: 2024-12-13 02:05:50.430 [INFO][3518] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:05:50.448966 env[1236]: 2024-12-13 02:05:50.431 [INFO][3518] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:05:50.448966 env[1236]: 2024-12-13 02:05:50.439 [WARNING][3518] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1" HandleID="k8s-pod-network.3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xmdl8-eth0" Dec 13 02:05:50.448966 env[1236]: 2024-12-13 02:05:50.440 [INFO][3518] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1" HandleID="k8s-pod-network.3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xmdl8-eth0" Dec 13 02:05:50.448966 env[1236]: 2024-12-13 02:05:50.441 [INFO][3518] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:05:50.448966 env[1236]: 2024-12-13 02:05:50.445 [INFO][3497] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1" Dec 13 02:05:50.457912 env[1236]: time="2024-12-13T02:05:50.453433308Z" level=info msg="TearDown network for sandbox \"3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1\" successfully" Dec 13 02:05:50.457912 env[1236]: time="2024-12-13T02:05:50.453487664Z" level=info msg="StopPodSandbox for \"3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1\" returns successfully" Dec 13 02:05:50.453313 systemd[1]: run-netns-cni\x2d8d763a71\x2d6865\x2d6359\x2d7ea3\x2d8400100236a1.mount: Deactivated successfully. Dec 13 02:05:50.460037 env[1236]: time="2024-12-13T02:05:50.459989833Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-xmdl8,Uid:1d1a3cd6-7ba6-4d29-a8c4-9d3e0364c3e8,Namespace:kube-system,Attempt:1,}" Dec 13 02:05:50.529244 env[1236]: 2024-12-13 02:05:50.398 [INFO][3502] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c" Dec 13 02:05:50.529244 env[1236]: 2024-12-13 02:05:50.398 [INFO][3502] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c" iface="eth0" netns="/var/run/netns/cni-1aa8e657-8545-f794-7752-6ac10c7eee6f" Dec 13 02:05:50.529244 env[1236]: 2024-12-13 02:05:50.398 [INFO][3502] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c" iface="eth0" netns="/var/run/netns/cni-1aa8e657-8545-f794-7752-6ac10c7eee6f" Dec 13 02:05:50.529244 env[1236]: 2024-12-13 02:05:50.399 [INFO][3502] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c" iface="eth0" netns="/var/run/netns/cni-1aa8e657-8545-f794-7752-6ac10c7eee6f" Dec 13 02:05:50.529244 env[1236]: 2024-12-13 02:05:50.399 [INFO][3502] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c" Dec 13 02:05:50.529244 env[1236]: 2024-12-13 02:05:50.399 [INFO][3502] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c" Dec 13 02:05:50.529244 env[1236]: 2024-12-13 02:05:50.511 [INFO][3524] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c" HandleID="k8s-pod-network.e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-csi--node--driver--25lng-eth0" Dec 13 02:05:50.529244 env[1236]: 2024-12-13 02:05:50.512 [INFO][3524] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:05:50.529244 env[1236]: 2024-12-13 02:05:50.512 [INFO][3524] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:05:50.529244 env[1236]: 2024-12-13 02:05:50.522 [WARNING][3524] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c" HandleID="k8s-pod-network.e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-csi--node--driver--25lng-eth0" Dec 13 02:05:50.529244 env[1236]: 2024-12-13 02:05:50.522 [INFO][3524] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c" HandleID="k8s-pod-network.e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-csi--node--driver--25lng-eth0" Dec 13 02:05:50.529244 env[1236]: 2024-12-13 02:05:50.524 [INFO][3524] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:05:50.529244 env[1236]: 2024-12-13 02:05:50.526 [INFO][3502] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c" Dec 13 02:05:50.534681 systemd[1]: run-netns-cni\x2d1aa8e657\x2d8545\x2df794\x2d7752\x2d6ac10c7eee6f.mount: Deactivated successfully. Dec 13 02:05:50.537158 env[1236]: time="2024-12-13T02:05:50.537072842Z" level=info msg="TearDown network for sandbox \"e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c\" successfully" Dec 13 02:05:50.537359 env[1236]: time="2024-12-13T02:05:50.537326888Z" level=info msg="StopPodSandbox for \"e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c\" returns successfully" Dec 13 02:05:50.538478 env[1236]: time="2024-12-13T02:05:50.538435730Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-25lng,Uid:fe43aeca-7618-49ba-af44-ec58d6fa89be,Namespace:calico-system,Attempt:1,}" Dec 13 02:05:50.619939 env[1236]: 2024-12-13 02:05:50.421 [INFO][3510] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79" Dec 13 02:05:50.619939 env[1236]: 2024-12-13 02:05:50.421 [INFO][3510] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79" iface="eth0" netns="/var/run/netns/cni-6ce0899c-2950-1799-288d-39d1385ea212" Dec 13 02:05:50.619939 env[1236]: 2024-12-13 02:05:50.421 [INFO][3510] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79" iface="eth0" netns="/var/run/netns/cni-6ce0899c-2950-1799-288d-39d1385ea212" Dec 13 02:05:50.619939 env[1236]: 2024-12-13 02:05:50.422 [INFO][3510] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79" iface="eth0" netns="/var/run/netns/cni-6ce0899c-2950-1799-288d-39d1385ea212" Dec 13 02:05:50.619939 env[1236]: 2024-12-13 02:05:50.422 [INFO][3510] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79" Dec 13 02:05:50.619939 env[1236]: 2024-12-13 02:05:50.422 [INFO][3510] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79" Dec 13 02:05:50.619939 env[1236]: 2024-12-13 02:05:50.579 [INFO][3529] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79" HandleID="k8s-pod-network.23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbc6f5ff--k644c-eth0" Dec 13 02:05:50.619939 env[1236]: 2024-12-13 02:05:50.580 [INFO][3529] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:05:50.619939 env[1236]: 2024-12-13 02:05:50.580 [INFO][3529] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:05:50.619939 env[1236]: 2024-12-13 02:05:50.589 [WARNING][3529] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79" HandleID="k8s-pod-network.23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbc6f5ff--k644c-eth0" Dec 13 02:05:50.619939 env[1236]: 2024-12-13 02:05:50.589 [INFO][3529] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79" HandleID="k8s-pod-network.23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbc6f5ff--k644c-eth0" Dec 13 02:05:50.619939 env[1236]: 2024-12-13 02:05:50.591 [INFO][3529] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:05:50.619939 env[1236]: 2024-12-13 02:05:50.617 [INFO][3510] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79" Dec 13 02:05:50.620883 env[1236]: time="2024-12-13T02:05:50.620369636Z" level=info msg="TearDown network for sandbox \"23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79\" successfully" Dec 13 02:05:50.620883 env[1236]: time="2024-12-13T02:05:50.620454794Z" level=info msg="StopPodSandbox for \"23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79\" returns successfully" Dec 13 02:05:50.622165 env[1236]: time="2024-12-13T02:05:50.622097014Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-dbc6f5ff-k644c,Uid:ab5406ea-be6d-43ba-ad0a-95a82cc144df,Namespace:calico-system,Attempt:1,}" Dec 13 02:05:50.800008 systemd-networkd[1030]: cali3086da20e0f: Link UP Dec 13 02:05:50.810366 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:05:50.819349 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3086da20e0f: link becomes ready Dec 13 02:05:50.823395 systemd-networkd[1030]: cali3086da20e0f: Gained carrier Dec 13 02:05:50.863461 env[1236]: 2024-12-13 02:05:50.600 [INFO][3534] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 02:05:50.863461 env[1236]: 2024-12-13 02:05:50.621 [INFO][3534] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xmdl8-eth0 coredns-7db6d8ff4d- kube-system 1d1a3cd6-7ba6-4d29-a8c4-9d3e0364c3e8 783 0 2024-12-13 02:05:16 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal coredns-7db6d8ff4d-xmdl8 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali3086da20e0f [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="cdcaddcec50b997fb9bd2f741eb62abdc1cf7a5dc05c5f4dcd78776859501286" Namespace="kube-system" Pod="coredns-7db6d8ff4d-xmdl8" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xmdl8-" Dec 13 02:05:50.863461 env[1236]: 2024-12-13 02:05:50.624 [INFO][3534] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="cdcaddcec50b997fb9bd2f741eb62abdc1cf7a5dc05c5f4dcd78776859501286" Namespace="kube-system" Pod="coredns-7db6d8ff4d-xmdl8" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xmdl8-eth0" Dec 13 02:05:50.863461 env[1236]: 2024-12-13 02:05:50.698 [INFO][3562] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="cdcaddcec50b997fb9bd2f741eb62abdc1cf7a5dc05c5f4dcd78776859501286" HandleID="k8s-pod-network.cdcaddcec50b997fb9bd2f741eb62abdc1cf7a5dc05c5f4dcd78776859501286" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xmdl8-eth0" Dec 13 02:05:50.863461 env[1236]: 2024-12-13 02:05:50.716 [INFO][3562] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="cdcaddcec50b997fb9bd2f741eb62abdc1cf7a5dc05c5f4dcd78776859501286" HandleID="k8s-pod-network.cdcaddcec50b997fb9bd2f741eb62abdc1cf7a5dc05c5f4dcd78776859501286" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xmdl8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000310af0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal", "pod":"coredns-7db6d8ff4d-xmdl8", "timestamp":"2024-12-13 02:05:50.698457885 +0000 UTC"}, Hostname:"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:05:50.863461 env[1236]: 2024-12-13 02:05:50.716 [INFO][3562] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:05:50.863461 env[1236]: 2024-12-13 02:05:50.716 [INFO][3562] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:05:50.863461 env[1236]: 2024-12-13 02:05:50.716 [INFO][3562] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal' Dec 13 02:05:50.863461 env[1236]: 2024-12-13 02:05:50.719 [INFO][3562] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.cdcaddcec50b997fb9bd2f741eb62abdc1cf7a5dc05c5f4dcd78776859501286" host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:50.863461 env[1236]: 2024-12-13 02:05:50.730 [INFO][3562] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:50.863461 env[1236]: 2024-12-13 02:05:50.738 [INFO][3562] ipam/ipam.go 489: Trying affinity for 192.168.64.64/26 host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:50.863461 env[1236]: 2024-12-13 02:05:50.742 [INFO][3562] ipam/ipam.go 155: Attempting to load block cidr=192.168.64.64/26 host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:50.863461 env[1236]: 2024-12-13 02:05:50.747 [INFO][3562] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.64.64/26 host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:50.863461 env[1236]: 2024-12-13 02:05:50.747 [INFO][3562] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.64.64/26 handle="k8s-pod-network.cdcaddcec50b997fb9bd2f741eb62abdc1cf7a5dc05c5f4dcd78776859501286" host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:50.863461 env[1236]: 2024-12-13 02:05:50.751 [INFO][3562] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.cdcaddcec50b997fb9bd2f741eb62abdc1cf7a5dc05c5f4dcd78776859501286 Dec 13 02:05:50.863461 env[1236]: 2024-12-13 02:05:50.759 [INFO][3562] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.64.64/26 handle="k8s-pod-network.cdcaddcec50b997fb9bd2f741eb62abdc1cf7a5dc05c5f4dcd78776859501286" host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:50.863461 env[1236]: 2024-12-13 02:05:50.774 [INFO][3562] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.64.65/26] block=192.168.64.64/26 handle="k8s-pod-network.cdcaddcec50b997fb9bd2f741eb62abdc1cf7a5dc05c5f4dcd78776859501286" host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:50.863461 env[1236]: 2024-12-13 02:05:50.774 [INFO][3562] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.64.65/26] handle="k8s-pod-network.cdcaddcec50b997fb9bd2f741eb62abdc1cf7a5dc05c5f4dcd78776859501286" host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:50.863461 env[1236]: 2024-12-13 02:05:50.774 [INFO][3562] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:05:50.863461 env[1236]: 2024-12-13 02:05:50.774 [INFO][3562] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.64.65/26] IPv6=[] ContainerID="cdcaddcec50b997fb9bd2f741eb62abdc1cf7a5dc05c5f4dcd78776859501286" HandleID="k8s-pod-network.cdcaddcec50b997fb9bd2f741eb62abdc1cf7a5dc05c5f4dcd78776859501286" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xmdl8-eth0" Dec 13 02:05:50.864806 env[1236]: 2024-12-13 02:05:50.776 [INFO][3534] cni-plugin/k8s.go 386: Populated endpoint ContainerID="cdcaddcec50b997fb9bd2f741eb62abdc1cf7a5dc05c5f4dcd78776859501286" Namespace="kube-system" Pod="coredns-7db6d8ff4d-xmdl8" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xmdl8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xmdl8-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"1d1a3cd6-7ba6-4d29-a8c4-9d3e0364c3e8", ResourceVersion:"783", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal", ContainerID:"", Pod:"coredns-7db6d8ff4d-xmdl8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3086da20e0f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:05:50.864806 env[1236]: 2024-12-13 02:05:50.777 [INFO][3534] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.64.65/32] ContainerID="cdcaddcec50b997fb9bd2f741eb62abdc1cf7a5dc05c5f4dcd78776859501286" Namespace="kube-system" Pod="coredns-7db6d8ff4d-xmdl8" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xmdl8-eth0" Dec 13 02:05:50.864806 env[1236]: 2024-12-13 02:05:50.777 [INFO][3534] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali3086da20e0f ContainerID="cdcaddcec50b997fb9bd2f741eb62abdc1cf7a5dc05c5f4dcd78776859501286" Namespace="kube-system" Pod="coredns-7db6d8ff4d-xmdl8" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xmdl8-eth0" Dec 13 02:05:50.864806 env[1236]: 2024-12-13 02:05:50.824 [INFO][3534] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="cdcaddcec50b997fb9bd2f741eb62abdc1cf7a5dc05c5f4dcd78776859501286" Namespace="kube-system" Pod="coredns-7db6d8ff4d-xmdl8" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xmdl8-eth0" Dec 13 02:05:50.864806 env[1236]: 2024-12-13 02:05:50.824 [INFO][3534] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="cdcaddcec50b997fb9bd2f741eb62abdc1cf7a5dc05c5f4dcd78776859501286" Namespace="kube-system" Pod="coredns-7db6d8ff4d-xmdl8" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xmdl8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xmdl8-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"1d1a3cd6-7ba6-4d29-a8c4-9d3e0364c3e8", ResourceVersion:"783", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal", ContainerID:"cdcaddcec50b997fb9bd2f741eb62abdc1cf7a5dc05c5f4dcd78776859501286", Pod:"coredns-7db6d8ff4d-xmdl8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3086da20e0f", MAC:"da:99:99:73:fc:3b", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:05:50.864806 env[1236]: 2024-12-13 02:05:50.843 [INFO][3534] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="cdcaddcec50b997fb9bd2f741eb62abdc1cf7a5dc05c5f4dcd78776859501286" Namespace="kube-system" Pod="coredns-7db6d8ff4d-xmdl8" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xmdl8-eth0" Dec 13 02:05:50.900315 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali963f6e237ff: link becomes ready Dec 13 02:05:50.902375 systemd-networkd[1030]: cali963f6e237ff: Link UP Dec 13 02:05:50.906217 systemd-networkd[1030]: cali963f6e237ff: Gained carrier Dec 13 02:05:50.941913 env[1236]: 2024-12-13 02:05:50.619 [INFO][3547] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 02:05:50.941913 env[1236]: 2024-12-13 02:05:50.652 [INFO][3547] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-csi--node--driver--25lng-eth0 csi-node-driver- calico-system fe43aeca-7618-49ba-af44-ec58d6fa89be 784 0 2024-12-13 02:05:25 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:65bf684474 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal csi-node-driver-25lng eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali963f6e237ff [] []}} ContainerID="d56f65a97103555104993df021a887733c10448fb162dccf9bb4d21a27c66cad" Namespace="calico-system" Pod="csi-node-driver-25lng" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-csi--node--driver--25lng-" Dec 13 02:05:50.941913 env[1236]: 2024-12-13 02:05:50.652 [INFO][3547] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="d56f65a97103555104993df021a887733c10448fb162dccf9bb4d21a27c66cad" Namespace="calico-system" Pod="csi-node-driver-25lng" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-csi--node--driver--25lng-eth0" Dec 13 02:05:50.941913 env[1236]: 2024-12-13 02:05:50.765 [INFO][3575] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d56f65a97103555104993df021a887733c10448fb162dccf9bb4d21a27c66cad" HandleID="k8s-pod-network.d56f65a97103555104993df021a887733c10448fb162dccf9bb4d21a27c66cad" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-csi--node--driver--25lng-eth0" Dec 13 02:05:50.941913 env[1236]: 2024-12-13 02:05:50.790 [INFO][3575] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d56f65a97103555104993df021a887733c10448fb162dccf9bb4d21a27c66cad" HandleID="k8s-pod-network.d56f65a97103555104993df021a887733c10448fb162dccf9bb4d21a27c66cad" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-csi--node--driver--25lng-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000292c30), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal", "pod":"csi-node-driver-25lng", "timestamp":"2024-12-13 02:05:50.765716033 +0000 UTC"}, Hostname:"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:05:50.941913 env[1236]: 2024-12-13 02:05:50.791 [INFO][3575] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:05:50.941913 env[1236]: 2024-12-13 02:05:50.791 [INFO][3575] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:05:50.941913 env[1236]: 2024-12-13 02:05:50.791 [INFO][3575] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal' Dec 13 02:05:50.941913 env[1236]: 2024-12-13 02:05:50.794 [INFO][3575] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d56f65a97103555104993df021a887733c10448fb162dccf9bb4d21a27c66cad" host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:50.941913 env[1236]: 2024-12-13 02:05:50.832 [INFO][3575] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:50.941913 env[1236]: 2024-12-13 02:05:50.847 [INFO][3575] ipam/ipam.go 489: Trying affinity for 192.168.64.64/26 host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:50.941913 env[1236]: 2024-12-13 02:05:50.852 [INFO][3575] ipam/ipam.go 155: Attempting to load block cidr=192.168.64.64/26 host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:50.941913 env[1236]: 2024-12-13 02:05:50.859 [INFO][3575] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.64.64/26 host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:50.941913 env[1236]: 2024-12-13 02:05:50.860 [INFO][3575] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.64.64/26 handle="k8s-pod-network.d56f65a97103555104993df021a887733c10448fb162dccf9bb4d21a27c66cad" host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:50.941913 env[1236]: 2024-12-13 02:05:50.868 [INFO][3575] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.d56f65a97103555104993df021a887733c10448fb162dccf9bb4d21a27c66cad Dec 13 02:05:50.941913 env[1236]: 2024-12-13 02:05:50.878 [INFO][3575] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.64.64/26 handle="k8s-pod-network.d56f65a97103555104993df021a887733c10448fb162dccf9bb4d21a27c66cad" host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:50.941913 env[1236]: 2024-12-13 02:05:50.886 [INFO][3575] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.64.66/26] block=192.168.64.64/26 handle="k8s-pod-network.d56f65a97103555104993df021a887733c10448fb162dccf9bb4d21a27c66cad" host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:50.941913 env[1236]: 2024-12-13 02:05:50.886 [INFO][3575] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.64.66/26] handle="k8s-pod-network.d56f65a97103555104993df021a887733c10448fb162dccf9bb4d21a27c66cad" host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:50.941913 env[1236]: 2024-12-13 02:05:50.887 [INFO][3575] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:05:50.941913 env[1236]: 2024-12-13 02:05:50.887 [INFO][3575] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.64.66/26] IPv6=[] ContainerID="d56f65a97103555104993df021a887733c10448fb162dccf9bb4d21a27c66cad" HandleID="k8s-pod-network.d56f65a97103555104993df021a887733c10448fb162dccf9bb4d21a27c66cad" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-csi--node--driver--25lng-eth0" Dec 13 02:05:50.943473 env[1236]: 2024-12-13 02:05:50.889 [INFO][3547] cni-plugin/k8s.go 386: Populated endpoint ContainerID="d56f65a97103555104993df021a887733c10448fb162dccf9bb4d21a27c66cad" Namespace="calico-system" Pod="csi-node-driver-25lng" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-csi--node--driver--25lng-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-csi--node--driver--25lng-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"fe43aeca-7618-49ba-af44-ec58d6fa89be", ResourceVersion:"784", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal", ContainerID:"", Pod:"csi-node-driver-25lng", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.64.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali963f6e237ff", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:05:50.943473 env[1236]: 2024-12-13 02:05:50.889 [INFO][3547] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.64.66/32] ContainerID="d56f65a97103555104993df021a887733c10448fb162dccf9bb4d21a27c66cad" Namespace="calico-system" Pod="csi-node-driver-25lng" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-csi--node--driver--25lng-eth0" Dec 13 02:05:50.943473 env[1236]: 2024-12-13 02:05:50.890 [INFO][3547] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali963f6e237ff ContainerID="d56f65a97103555104993df021a887733c10448fb162dccf9bb4d21a27c66cad" Namespace="calico-system" Pod="csi-node-driver-25lng" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-csi--node--driver--25lng-eth0" Dec 13 02:05:50.943473 env[1236]: 2024-12-13 02:05:50.910 [INFO][3547] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d56f65a97103555104993df021a887733c10448fb162dccf9bb4d21a27c66cad" Namespace="calico-system" Pod="csi-node-driver-25lng" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-csi--node--driver--25lng-eth0" Dec 13 02:05:50.943473 env[1236]: 2024-12-13 02:05:50.914 [INFO][3547] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="d56f65a97103555104993df021a887733c10448fb162dccf9bb4d21a27c66cad" Namespace="calico-system" Pod="csi-node-driver-25lng" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-csi--node--driver--25lng-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-csi--node--driver--25lng-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"fe43aeca-7618-49ba-af44-ec58d6fa89be", ResourceVersion:"784", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal", ContainerID:"d56f65a97103555104993df021a887733c10448fb162dccf9bb4d21a27c66cad", Pod:"csi-node-driver-25lng", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.64.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali963f6e237ff", MAC:"4e:37:a5:a7:6b:42", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:05:50.943473 env[1236]: 2024-12-13 02:05:50.937 [INFO][3547] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="d56f65a97103555104993df021a887733c10448fb162dccf9bb4d21a27c66cad" Namespace="calico-system" Pod="csi-node-driver-25lng" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-csi--node--driver--25lng-eth0" Dec 13 02:05:50.952167 env[1236]: time="2024-12-13T02:05:50.951734245Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:05:50.952167 env[1236]: time="2024-12-13T02:05:50.951841780Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:05:50.952167 env[1236]: time="2024-12-13T02:05:50.951887468Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:05:50.953619 env[1236]: time="2024-12-13T02:05:50.952290503Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cdcaddcec50b997fb9bd2f741eb62abdc1cf7a5dc05c5f4dcd78776859501286 pid=3616 runtime=io.containerd.runc.v2 Dec 13 02:05:50.994474 systemd-networkd[1030]: cali1a7de5fa6d7: Link UP Dec 13 02:05:51.004206 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1a7de5fa6d7: link becomes ready Dec 13 02:05:51.005449 systemd-networkd[1030]: cali1a7de5fa6d7: Gained carrier Dec 13 02:05:51.021357 systemd[1]: Started cri-containerd-cdcaddcec50b997fb9bd2f741eb62abdc1cf7a5dc05c5f4dcd78776859501286.scope. Dec 13 02:05:51.078716 kernel: kauditd_printk_skb: 68 callbacks suppressed Dec 13 02:05:51.078901 kernel: audit: type=1400 audit(1734055551.051:1011): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.092532 env[1236]: 2024-12-13 02:05:50.759 [INFO][3567] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 02:05:51.092532 env[1236]: 2024-12-13 02:05:50.784 [INFO][3567] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbc6f5ff--k644c-eth0 calico-kube-controllers-dbc6f5ff- calico-system ab5406ea-be6d-43ba-ad0a-95a82cc144df 785 0 2024-12-13 02:05:25 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:dbc6f5ff projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal calico-kube-controllers-dbc6f5ff-k644c eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali1a7de5fa6d7 [] []}} ContainerID="4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" Namespace="calico-system" Pod="calico-kube-controllers-dbc6f5ff-k644c" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbc6f5ff--k644c-" Dec 13 02:05:51.092532 env[1236]: 2024-12-13 02:05:50.784 [INFO][3567] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" Namespace="calico-system" Pod="calico-kube-controllers-dbc6f5ff-k644c" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbc6f5ff--k644c-eth0" Dec 13 02:05:51.092532 env[1236]: 2024-12-13 02:05:50.916 [INFO][3591] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" HandleID="k8s-pod-network.4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbc6f5ff--k644c-eth0" Dec 13 02:05:51.092532 env[1236]: 2024-12-13 02:05:50.945 [INFO][3591] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" HandleID="k8s-pod-network.4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbc6f5ff--k644c-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002acfa0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal", "pod":"calico-kube-controllers-dbc6f5ff-k644c", "timestamp":"2024-12-13 02:05:50.916185623 +0000 UTC"}, Hostname:"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:05:51.092532 env[1236]: 2024-12-13 02:05:50.946 [INFO][3591] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:05:51.092532 env[1236]: 2024-12-13 02:05:50.946 [INFO][3591] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:05:51.092532 env[1236]: 2024-12-13 02:05:50.946 [INFO][3591] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal' Dec 13 02:05:51.092532 env[1236]: 2024-12-13 02:05:50.948 [INFO][3591] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:51.092532 env[1236]: 2024-12-13 02:05:50.953 [INFO][3591] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:51.092532 env[1236]: 2024-12-13 02:05:50.959 [INFO][3591] ipam/ipam.go 489: Trying affinity for 192.168.64.64/26 host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:51.092532 env[1236]: 2024-12-13 02:05:50.961 [INFO][3591] ipam/ipam.go 155: Attempting to load block cidr=192.168.64.64/26 host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:51.092532 env[1236]: 2024-12-13 02:05:50.964 [INFO][3591] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.64.64/26 host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:51.092532 env[1236]: 2024-12-13 02:05:50.964 [INFO][3591] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.64.64/26 handle="k8s-pod-network.4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:51.092532 env[1236]: 2024-12-13 02:05:50.966 [INFO][3591] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155 Dec 13 02:05:51.092532 env[1236]: 2024-12-13 02:05:50.973 [INFO][3591] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.64.64/26 handle="k8s-pod-network.4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:51.092532 env[1236]: 2024-12-13 02:05:50.985 [INFO][3591] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.64.67/26] block=192.168.64.64/26 handle="k8s-pod-network.4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:51.092532 env[1236]: 2024-12-13 02:05:50.985 [INFO][3591] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.64.67/26] handle="k8s-pod-network.4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:51.092532 env[1236]: 2024-12-13 02:05:50.985 [INFO][3591] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:05:51.092532 env[1236]: 2024-12-13 02:05:50.985 [INFO][3591] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.64.67/26] IPv6=[] ContainerID="4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" HandleID="k8s-pod-network.4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbc6f5ff--k644c-eth0" Dec 13 02:05:51.094154 env[1236]: 2024-12-13 02:05:50.988 [INFO][3567] cni-plugin/k8s.go 386: Populated endpoint ContainerID="4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" Namespace="calico-system" Pod="calico-kube-controllers-dbc6f5ff-k644c" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbc6f5ff--k644c-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbc6f5ff--k644c-eth0", GenerateName:"calico-kube-controllers-dbc6f5ff-", Namespace:"calico-system", SelfLink:"", UID:"ab5406ea-be6d-43ba-ad0a-95a82cc144df", ResourceVersion:"785", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"dbc6f5ff", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-kube-controllers-dbc6f5ff-k644c", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.64.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali1a7de5fa6d7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:05:51.094154 env[1236]: 2024-12-13 02:05:50.988 [INFO][3567] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.64.67/32] ContainerID="4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" Namespace="calico-system" Pod="calico-kube-controllers-dbc6f5ff-k644c" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbc6f5ff--k644c-eth0" Dec 13 02:05:51.094154 env[1236]: 2024-12-13 02:05:50.988 [INFO][3567] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali1a7de5fa6d7 ContainerID="4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" Namespace="calico-system" Pod="calico-kube-controllers-dbc6f5ff-k644c" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbc6f5ff--k644c-eth0" Dec 13 02:05:51.094154 env[1236]: 2024-12-13 02:05:51.006 [INFO][3567] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" Namespace="calico-system" Pod="calico-kube-controllers-dbc6f5ff-k644c" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbc6f5ff--k644c-eth0" Dec 13 02:05:51.094154 env[1236]: 2024-12-13 02:05:51.006 [INFO][3567] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" Namespace="calico-system" Pod="calico-kube-controllers-dbc6f5ff-k644c" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbc6f5ff--k644c-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbc6f5ff--k644c-eth0", GenerateName:"calico-kube-controllers-dbc6f5ff-", Namespace:"calico-system", SelfLink:"", UID:"ab5406ea-be6d-43ba-ad0a-95a82cc144df", ResourceVersion:"785", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"dbc6f5ff", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal", ContainerID:"4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155", Pod:"calico-kube-controllers-dbc6f5ff-k644c", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.64.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali1a7de5fa6d7", MAC:"52:07:5a:5d:d9:21", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:05:51.094154 env[1236]: 2024-12-13 02:05:51.023 [INFO][3567] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" Namespace="calico-system" Pod="calico-kube-controllers-dbc6f5ff-k644c" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbc6f5ff--k644c-eth0" Dec 13 02:05:51.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.117156 kernel: audit: type=1400 audit(1734055551.051:1012): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.118546 env[1236]: time="2024-12-13T02:05:51.091411788Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:05:51.118546 env[1236]: time="2024-12-13T02:05:51.091495773Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:05:51.118546 env[1236]: time="2024-12-13T02:05:51.091518589Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:05:51.118546 env[1236]: time="2024-12-13T02:05:51.091870452Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d56f65a97103555104993df021a887733c10448fb162dccf9bb4d21a27c66cad pid=3650 runtime=io.containerd.runc.v2 Dec 13 02:05:51.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.159140 kernel: audit: type=1400 audit(1734055551.051:1013): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.200348 kernel: audit: type=1400 audit(1734055551.051:1014): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.228137 kernel: audit: type=1400 audit(1734055551.051:1015): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.241043 systemd[1]: Started cri-containerd-d56f65a97103555104993df021a887733c10448fb162dccf9bb4d21a27c66cad.scope. Dec 13 02:05:51.257137 kernel: audit: type=1400 audit(1734055551.051:1016): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.264642 env[1236]: time="2024-12-13T02:05:51.264589582Z" level=info msg="StopPodSandbox for \"07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4\"" Dec 13 02:05:51.265705 env[1236]: time="2024-12-13T02:05:51.265656681Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-xmdl8,Uid:1d1a3cd6-7ba6-4d29-a8c4-9d3e0364c3e8,Namespace:kube-system,Attempt:1,} returns sandbox id \"cdcaddcec50b997fb9bd2f741eb62abdc1cf7a5dc05c5f4dcd78776859501286\"" Dec 13 02:05:51.266786 env[1236]: time="2024-12-13T02:05:51.264975870Z" level=info msg="StopPodSandbox for \"f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2\"" Dec 13 02:05:51.274839 env[1236]: time="2024-12-13T02:05:51.274787289Z" level=info msg="CreateContainer within sandbox \"cdcaddcec50b997fb9bd2f741eb62abdc1cf7a5dc05c5f4dcd78776859501286\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 02:05:51.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.297222 kernel: audit: type=1400 audit(1734055551.051:1017): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.302293 env[1236]: time="2024-12-13T02:05:51.302045859Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:05:51.303355 env[1236]: time="2024-12-13T02:05:51.302471673Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:05:51.303355 env[1236]: time="2024-12-13T02:05:51.302558784Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:05:51.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.309947 env[1236]: time="2024-12-13T02:05:51.304395666Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155 pid=3719 runtime=io.containerd.runc.v2 Dec 13 02:05:51.328204 kernel: audit: type=1400 audit(1734055551.051:1018): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.355786 kernel: audit: type=1400 audit(1734055551.051:1019): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.359277 systemd[1]: Started cri-containerd-4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155.scope. Dec 13 02:05:51.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.363012 env[1236]: time="2024-12-13T02:05:51.362965955Z" level=info msg="CreateContainer within sandbox \"cdcaddcec50b997fb9bd2f741eb62abdc1cf7a5dc05c5f4dcd78776859501286\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"519d31494b86ce8523e60ef1d8ac52e352b1af40f4a3e118ff724b68276345f8\"" Dec 13 02:05:51.383814 kernel: audit: type=1400 audit(1734055551.077:1020): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.077000 audit: BPF prog-id=142 op=LOAD Dec 13 02:05:51.078000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.078000 audit[3628]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3616 pid=3628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364636164646365633530623939376662396264326637343165623632 Dec 13 02:05:51.078000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.078000 audit[3628]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3616 pid=3628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364636164646365633530623939376662396264326637343165623632 Dec 13 02:05:51.078000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.078000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.078000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.078000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.078000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.078000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.078000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.078000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.078000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.078000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.078000 audit: BPF prog-id=143 op=LOAD Dec 13 02:05:51.078000 audit[3628]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000336a00 items=0 ppid=3616 pid=3628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364636164646365633530623939376662396264326637343165623632 Dec 13 02:05:51.078000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.078000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.078000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.078000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.078000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.078000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.078000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.078000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.078000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.078000 audit: BPF prog-id=144 op=LOAD Dec 13 02:05:51.078000 audit[3628]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000336a48 items=0 ppid=3616 pid=3628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364636164646365633530623939376662396264326637343165623632 Dec 13 02:05:51.078000 audit: BPF prog-id=144 op=UNLOAD Dec 13 02:05:51.078000 audit: BPF prog-id=143 op=UNLOAD Dec 13 02:05:51.078000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.078000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.078000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.078000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.078000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.078000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.078000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.078000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.078000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.078000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.078000 audit: BPF prog-id=145 op=LOAD Dec 13 02:05:51.078000 audit[3628]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000336e58 items=0 ppid=3616 pid=3628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364636164646365633530623939376662396264326637343165623632 Dec 13 02:05:51.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.382000 audit: BPF prog-id=146 op=LOAD Dec 13 02:05:51.390591 env[1236]: time="2024-12-13T02:05:51.390540745Z" level=info msg="StartContainer for \"519d31494b86ce8523e60ef1d8ac52e352b1af40f4a3e118ff724b68276345f8\"" Dec 13 02:05:51.389000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.389000 audit[3682]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3650 pid=3682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435366636356139373130333535353130343939336466303231613838 Dec 13 02:05:51.398000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.398000 audit[3682]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3650 pid=3682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435366636356139373130333535353130343939336466303231613838 Dec 13 02:05:51.401000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.401000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.401000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.401000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.401000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.401000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.401000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.401000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.401000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.401000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.401000 audit: BPF prog-id=147 op=LOAD Dec 13 02:05:51.401000 audit[3682]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000218fb0 items=0 ppid=3650 pid=3682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435366636356139373130333535353130343939336466303231613838 Dec 13 02:05:51.403000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.403000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.403000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.403000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.403000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.403000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.403000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.403000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.403000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.403000 audit: BPF prog-id=148 op=LOAD Dec 13 02:05:51.403000 audit[3682]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000218ff8 items=0 ppid=3650 pid=3682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435366636356139373130333535353130343939336466303231613838 Dec 13 02:05:51.406000 audit: BPF prog-id=148 op=UNLOAD Dec 13 02:05:51.407000 audit: BPF prog-id=147 op=UNLOAD Dec 13 02:05:51.407000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.407000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.407000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.407000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.407000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.407000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.407000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.407000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.407000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.407000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.407000 audit: BPF prog-id=149 op=LOAD Dec 13 02:05:51.407000 audit[3682]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000219408 items=0 ppid=3650 pid=3682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435366636356139373130333535353130343939336466303231613838 Dec 13 02:05:51.477656 systemd[1]: run-netns-cni\x2d6ce0899c\x2d2950\x2d1799\x2d288d\x2d39d1385ea212.mount: Deactivated successfully. Dec 13 02:05:51.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.509000 audit: BPF prog-id=150 op=LOAD Dec 13 02:05:51.511000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.511000 audit[3753]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3719 pid=3753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465353461376633616666363331303537306564623232363461303532 Dec 13 02:05:51.511000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.511000 audit[3753]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3719 pid=3753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465353461376633616666363331303537306564623232363461303532 Dec 13 02:05:51.511000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.511000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.511000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.511000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.511000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.511000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.511000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.511000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.511000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.511000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.511000 audit: BPF prog-id=151 op=LOAD Dec 13 02:05:51.511000 audit[3753]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000025070 items=0 ppid=3719 pid=3753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465353461376633616666363331303537306564623232363461303532 Dec 13 02:05:51.512000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.512000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.512000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.512000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.512000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.512000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.512000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.512000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.512000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.512000 audit: BPF prog-id=152 op=LOAD Dec 13 02:05:51.512000 audit[3753]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0000250b8 items=0 ppid=3719 pid=3753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.512000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465353461376633616666363331303537306564623232363461303532 Dec 13 02:05:51.512000 audit: BPF prog-id=152 op=UNLOAD Dec 13 02:05:51.512000 audit: BPF prog-id=151 op=UNLOAD Dec 13 02:05:51.512000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.512000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.512000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.512000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.512000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.512000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.512000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.512000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.512000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.512000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.512000 audit: BPF prog-id=153 op=LOAD Dec 13 02:05:51.512000 audit[3753]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0000254c8 items=0 ppid=3719 pid=3753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.512000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465353461376633616666363331303537306564623232363461303532 Dec 13 02:05:51.526236 env[1236]: time="2024-12-13T02:05:51.526184391Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-25lng,Uid:fe43aeca-7618-49ba-af44-ec58d6fa89be,Namespace:calico-system,Attempt:1,} returns sandbox id \"d56f65a97103555104993df021a887733c10448fb162dccf9bb4d21a27c66cad\"" Dec 13 02:05:51.530963 env[1236]: time="2024-12-13T02:05:51.530914479Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 02:05:51.608598 systemd[1]: Started cri-containerd-519d31494b86ce8523e60ef1d8ac52e352b1af40f4a3e118ff724b68276345f8.scope. Dec 13 02:05:51.653665 systemd[1]: run-containerd-runc-k8s.io-519d31494b86ce8523e60ef1d8ac52e352b1af40f4a3e118ff724b68276345f8-runc.zEOXni.mount: Deactivated successfully. Dec 13 02:05:51.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.686000 audit: BPF prog-id=154 op=LOAD Dec 13 02:05:51.687000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.687000 audit[3802]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3616 pid=3802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531396433313439346238366365383532336536306566316438616335 Dec 13 02:05:51.688000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.688000 audit[3802]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3616 pid=3802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531396433313439346238366365383532336536306566316438616335 Dec 13 02:05:51.689000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.689000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.689000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.689000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.689000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.689000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.689000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.689000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.689000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.689000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.689000 audit: BPF prog-id=155 op=LOAD Dec 13 02:05:51.689000 audit[3802]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00031e920 items=0 ppid=3616 pid=3802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531396433313439346238366365383532336536306566316438616335 Dec 13 02:05:51.690000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.690000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.690000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.690000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.690000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.690000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.690000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.690000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.690000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.690000 audit: BPF prog-id=156 op=LOAD Dec 13 02:05:51.690000 audit[3802]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00031e968 items=0 ppid=3616 pid=3802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531396433313439346238366365383532336536306566316438616335 Dec 13 02:05:51.693000 audit: BPF prog-id=156 op=UNLOAD Dec 13 02:05:51.693000 audit: BPF prog-id=155 op=UNLOAD Dec 13 02:05:51.693000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.693000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.693000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.693000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.693000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.693000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.693000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.693000 audit[3802]: AVC avc: denied { perfmon } for pid=3802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.693000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.693000 audit[3802]: AVC avc: denied { bpf } for pid=3802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.693000 audit: BPF prog-id=157 op=LOAD Dec 13 02:05:51.693000 audit[3802]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00031ed78 items=0 ppid=3616 pid=3802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531396433313439346238366365383532336536306566316438616335 Dec 13 02:05:51.742475 env[1236]: time="2024-12-13T02:05:51.742416527Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-dbc6f5ff-k644c,Uid:ab5406ea-be6d-43ba-ad0a-95a82cc144df,Namespace:calico-system,Attempt:1,} returns sandbox id \"4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155\"" Dec 13 02:05:51.753342 env[1236]: time="2024-12-13T02:05:51.753289269Z" level=info msg="StartContainer for \"519d31494b86ce8523e60ef1d8ac52e352b1af40f4a3e118ff724b68276345f8\" returns successfully" Dec 13 02:05:51.841010 systemd-networkd[1030]: cali3086da20e0f: Gained IPv6LL Dec 13 02:05:51.849807 env[1236]: 2024-12-13 02:05:51.612 [INFO][3783] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4" Dec 13 02:05:51.849807 env[1236]: 2024-12-13 02:05:51.612 [INFO][3783] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4" iface="eth0" netns="/var/run/netns/cni-184e1176-833c-df3d-d37e-052a0b4be6e0" Dec 13 02:05:51.849807 env[1236]: 2024-12-13 02:05:51.612 [INFO][3783] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4" iface="eth0" netns="/var/run/netns/cni-184e1176-833c-df3d-d37e-052a0b4be6e0" Dec 13 02:05:51.849807 env[1236]: 2024-12-13 02:05:51.612 [INFO][3783] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4" iface="eth0" netns="/var/run/netns/cni-184e1176-833c-df3d-d37e-052a0b4be6e0" Dec 13 02:05:51.849807 env[1236]: 2024-12-13 02:05:51.612 [INFO][3783] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4" Dec 13 02:05:51.849807 env[1236]: 2024-12-13 02:05:51.613 [INFO][3783] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4" Dec 13 02:05:51.849807 env[1236]: 2024-12-13 02:05:51.802 [INFO][3821] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4" HandleID="k8s-pod-network.07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--ttx6t-eth0" Dec 13 02:05:51.849807 env[1236]: 2024-12-13 02:05:51.803 [INFO][3821] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:05:51.849807 env[1236]: 2024-12-13 02:05:51.803 [INFO][3821] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:05:51.849807 env[1236]: 2024-12-13 02:05:51.831 [WARNING][3821] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4" HandleID="k8s-pod-network.07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--ttx6t-eth0" Dec 13 02:05:51.849807 env[1236]: 2024-12-13 02:05:51.831 [INFO][3821] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4" HandleID="k8s-pod-network.07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--ttx6t-eth0" Dec 13 02:05:51.849807 env[1236]: 2024-12-13 02:05:51.845 [INFO][3821] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:05:51.849807 env[1236]: 2024-12-13 02:05:51.848 [INFO][3783] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4" Dec 13 02:05:51.860482 systemd[1]: run-netns-cni\x2d184e1176\x2d833c\x2ddf3d\x2dd37e\x2d052a0b4be6e0.mount: Deactivated successfully. Dec 13 02:05:51.870213 env[1236]: time="2024-12-13T02:05:51.866248663Z" level=info msg="TearDown network for sandbox \"07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4\" successfully" Dec 13 02:05:51.870213 env[1236]: time="2024-12-13T02:05:51.866372922Z" level=info msg="StopPodSandbox for \"07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4\" returns successfully" Dec 13 02:05:51.870924 env[1236]: time="2024-12-13T02:05:51.870856262Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-64b855cb6f-ttx6t,Uid:d1071b53-347f-4a14-9f06-84454932b905,Namespace:calico-apiserver,Attempt:1,}" Dec 13 02:05:51.889958 env[1236]: 2024-12-13 02:05:51.637 [INFO][3778] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2" Dec 13 02:05:51.889958 env[1236]: 2024-12-13 02:05:51.638 [INFO][3778] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2" iface="eth0" netns="/var/run/netns/cni-c4861f56-ec1a-d3bc-0a4a-5cc59f1c8aaf" Dec 13 02:05:51.889958 env[1236]: 2024-12-13 02:05:51.638 [INFO][3778] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2" iface="eth0" netns="/var/run/netns/cni-c4861f56-ec1a-d3bc-0a4a-5cc59f1c8aaf" Dec 13 02:05:51.889958 env[1236]: 2024-12-13 02:05:51.639 [INFO][3778] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2" iface="eth0" netns="/var/run/netns/cni-c4861f56-ec1a-d3bc-0a4a-5cc59f1c8aaf" Dec 13 02:05:51.889958 env[1236]: 2024-12-13 02:05:51.639 [INFO][3778] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2" Dec 13 02:05:51.889958 env[1236]: 2024-12-13 02:05:51.639 [INFO][3778] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2" Dec 13 02:05:51.889958 env[1236]: 2024-12-13 02:05:51.830 [INFO][3828] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2" HandleID="k8s-pod-network.f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--sc7rt-eth0" Dec 13 02:05:51.889958 env[1236]: 2024-12-13 02:05:51.831 [INFO][3828] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:05:51.889958 env[1236]: 2024-12-13 02:05:51.846 [INFO][3828] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:05:51.889958 env[1236]: 2024-12-13 02:05:51.883 [WARNING][3828] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2" HandleID="k8s-pod-network.f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--sc7rt-eth0" Dec 13 02:05:51.889958 env[1236]: 2024-12-13 02:05:51.884 [INFO][3828] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2" HandleID="k8s-pod-network.f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--sc7rt-eth0" Dec 13 02:05:51.889958 env[1236]: 2024-12-13 02:05:51.886 [INFO][3828] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:05:51.889958 env[1236]: 2024-12-13 02:05:51.888 [INFO][3778] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2" Dec 13 02:05:51.890898 env[1236]: time="2024-12-13T02:05:51.890496821Z" level=info msg="TearDown network for sandbox \"f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2\" successfully" Dec 13 02:05:51.890898 env[1236]: time="2024-12-13T02:05:51.890548178Z" level=info msg="StopPodSandbox for \"f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2\" returns successfully" Dec 13 02:05:51.891537 env[1236]: time="2024-12-13T02:05:51.891487789Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-sc7rt,Uid:c096b776-29d3-4474-9cfe-d2efcc213b0d,Namespace:kube-system,Attempt:1,}" Dec 13 02:05:52.096364 systemd-networkd[1030]: cali1a7de5fa6d7: Gained IPv6LL Dec 13 02:05:52.105596 systemd-networkd[1030]: cali48ad7098410: Link UP Dec 13 02:05:52.114213 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:05:52.123825 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali48ad7098410: link becomes ready Dec 13 02:05:52.124526 systemd-networkd[1030]: cali48ad7098410: Gained carrier Dec 13 02:05:52.146403 env[1236]: 2024-12-13 02:05:51.947 [INFO][3865] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 02:05:52.146403 env[1236]: 2024-12-13 02:05:51.968 [INFO][3865] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--ttx6t-eth0 calico-apiserver-64b855cb6f- calico-apiserver d1071b53-347f-4a14-9f06-84454932b905 802 0 2024-12-13 02:05:26 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:64b855cb6f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal calico-apiserver-64b855cb6f-ttx6t eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali48ad7098410 [] []}} ContainerID="fc91504e064ad9afd5c5cc3c4ad28b15b13f9e7b14ca16e965fd7a6d4844f5cf" Namespace="calico-apiserver" Pod="calico-apiserver-64b855cb6f-ttx6t" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--ttx6t-" Dec 13 02:05:52.146403 env[1236]: 2024-12-13 02:05:51.968 [INFO][3865] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="fc91504e064ad9afd5c5cc3c4ad28b15b13f9e7b14ca16e965fd7a6d4844f5cf" Namespace="calico-apiserver" Pod="calico-apiserver-64b855cb6f-ttx6t" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--ttx6t-eth0" Dec 13 02:05:52.146403 env[1236]: 2024-12-13 02:05:52.038 [INFO][3887] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fc91504e064ad9afd5c5cc3c4ad28b15b13f9e7b14ca16e965fd7a6d4844f5cf" HandleID="k8s-pod-network.fc91504e064ad9afd5c5cc3c4ad28b15b13f9e7b14ca16e965fd7a6d4844f5cf" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--ttx6t-eth0" Dec 13 02:05:52.146403 env[1236]: 2024-12-13 02:05:52.051 [INFO][3887] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="fc91504e064ad9afd5c5cc3c4ad28b15b13f9e7b14ca16e965fd7a6d4844f5cf" HandleID="k8s-pod-network.fc91504e064ad9afd5c5cc3c4ad28b15b13f9e7b14ca16e965fd7a6d4844f5cf" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--ttx6t-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000311380), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal", "pod":"calico-apiserver-64b855cb6f-ttx6t", "timestamp":"2024-12-13 02:05:52.038868726 +0000 UTC"}, Hostname:"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:05:52.146403 env[1236]: 2024-12-13 02:05:52.051 [INFO][3887] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:05:52.146403 env[1236]: 2024-12-13 02:05:52.051 [INFO][3887] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:05:52.146403 env[1236]: 2024-12-13 02:05:52.051 [INFO][3887] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal' Dec 13 02:05:52.146403 env[1236]: 2024-12-13 02:05:52.054 [INFO][3887] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.fc91504e064ad9afd5c5cc3c4ad28b15b13f9e7b14ca16e965fd7a6d4844f5cf" host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:52.146403 env[1236]: 2024-12-13 02:05:52.061 [INFO][3887] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:52.146403 env[1236]: 2024-12-13 02:05:52.069 [INFO][3887] ipam/ipam.go 489: Trying affinity for 192.168.64.64/26 host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:52.146403 env[1236]: 2024-12-13 02:05:52.073 [INFO][3887] ipam/ipam.go 155: Attempting to load block cidr=192.168.64.64/26 host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:52.146403 env[1236]: 2024-12-13 02:05:52.076 [INFO][3887] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.64.64/26 host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:52.146403 env[1236]: 2024-12-13 02:05:52.076 [INFO][3887] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.64.64/26 handle="k8s-pod-network.fc91504e064ad9afd5c5cc3c4ad28b15b13f9e7b14ca16e965fd7a6d4844f5cf" host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:52.146403 env[1236]: 2024-12-13 02:05:52.082 [INFO][3887] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.fc91504e064ad9afd5c5cc3c4ad28b15b13f9e7b14ca16e965fd7a6d4844f5cf Dec 13 02:05:52.146403 env[1236]: 2024-12-13 02:05:52.089 [INFO][3887] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.64.64/26 handle="k8s-pod-network.fc91504e064ad9afd5c5cc3c4ad28b15b13f9e7b14ca16e965fd7a6d4844f5cf" host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:52.146403 env[1236]: 2024-12-13 02:05:52.098 [INFO][3887] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.64.68/26] block=192.168.64.64/26 handle="k8s-pod-network.fc91504e064ad9afd5c5cc3c4ad28b15b13f9e7b14ca16e965fd7a6d4844f5cf" host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:52.146403 env[1236]: 2024-12-13 02:05:52.098 [INFO][3887] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.64.68/26] handle="k8s-pod-network.fc91504e064ad9afd5c5cc3c4ad28b15b13f9e7b14ca16e965fd7a6d4844f5cf" host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:52.146403 env[1236]: 2024-12-13 02:05:52.099 [INFO][3887] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:05:52.146403 env[1236]: 2024-12-13 02:05:52.099 [INFO][3887] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.64.68/26] IPv6=[] ContainerID="fc91504e064ad9afd5c5cc3c4ad28b15b13f9e7b14ca16e965fd7a6d4844f5cf" HandleID="k8s-pod-network.fc91504e064ad9afd5c5cc3c4ad28b15b13f9e7b14ca16e965fd7a6d4844f5cf" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--ttx6t-eth0" Dec 13 02:05:52.147701 env[1236]: 2024-12-13 02:05:52.101 [INFO][3865] cni-plugin/k8s.go 386: Populated endpoint ContainerID="fc91504e064ad9afd5c5cc3c4ad28b15b13f9e7b14ca16e965fd7a6d4844f5cf" Namespace="calico-apiserver" Pod="calico-apiserver-64b855cb6f-ttx6t" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--ttx6t-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--ttx6t-eth0", GenerateName:"calico-apiserver-64b855cb6f-", Namespace:"calico-apiserver", SelfLink:"", UID:"d1071b53-347f-4a14-9f06-84454932b905", ResourceVersion:"802", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"64b855cb6f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-apiserver-64b855cb6f-ttx6t", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.64.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali48ad7098410", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:05:52.147701 env[1236]: 2024-12-13 02:05:52.101 [INFO][3865] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.64.68/32] ContainerID="fc91504e064ad9afd5c5cc3c4ad28b15b13f9e7b14ca16e965fd7a6d4844f5cf" Namespace="calico-apiserver" Pod="calico-apiserver-64b855cb6f-ttx6t" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--ttx6t-eth0" Dec 13 02:05:52.147701 env[1236]: 2024-12-13 02:05:52.101 [INFO][3865] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali48ad7098410 ContainerID="fc91504e064ad9afd5c5cc3c4ad28b15b13f9e7b14ca16e965fd7a6d4844f5cf" Namespace="calico-apiserver" Pod="calico-apiserver-64b855cb6f-ttx6t" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--ttx6t-eth0" Dec 13 02:05:52.147701 env[1236]: 2024-12-13 02:05:52.126 [INFO][3865] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="fc91504e064ad9afd5c5cc3c4ad28b15b13f9e7b14ca16e965fd7a6d4844f5cf" Namespace="calico-apiserver" Pod="calico-apiserver-64b855cb6f-ttx6t" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--ttx6t-eth0" Dec 13 02:05:52.147701 env[1236]: 2024-12-13 02:05:52.129 [INFO][3865] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="fc91504e064ad9afd5c5cc3c4ad28b15b13f9e7b14ca16e965fd7a6d4844f5cf" Namespace="calico-apiserver" Pod="calico-apiserver-64b855cb6f-ttx6t" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--ttx6t-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--ttx6t-eth0", GenerateName:"calico-apiserver-64b855cb6f-", Namespace:"calico-apiserver", SelfLink:"", UID:"d1071b53-347f-4a14-9f06-84454932b905", ResourceVersion:"802", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"64b855cb6f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal", ContainerID:"fc91504e064ad9afd5c5cc3c4ad28b15b13f9e7b14ca16e965fd7a6d4844f5cf", Pod:"calico-apiserver-64b855cb6f-ttx6t", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.64.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali48ad7098410", MAC:"5a:24:86:71:c3:50", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:05:52.147701 env[1236]: 2024-12-13 02:05:52.140 [INFO][3865] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="fc91504e064ad9afd5c5cc3c4ad28b15b13f9e7b14ca16e965fd7a6d4844f5cf" Namespace="calico-apiserver" Pod="calico-apiserver-64b855cb6f-ttx6t" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--ttx6t-eth0" Dec 13 02:05:52.180465 env[1236]: time="2024-12-13T02:05:52.180353930Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:05:52.180660 env[1236]: time="2024-12-13T02:05:52.180480531Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:05:52.180660 env[1236]: time="2024-12-13T02:05:52.180525734Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:05:52.181009 env[1236]: time="2024-12-13T02:05:52.180722824Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fc91504e064ad9afd5c5cc3c4ad28b15b13f9e7b14ca16e965fd7a6d4844f5cf pid=3919 runtime=io.containerd.runc.v2 Dec 13 02:05:52.204199 systemd[1]: Started cri-containerd-fc91504e064ad9afd5c5cc3c4ad28b15b13f9e7b14ca16e965fd7a6d4844f5cf.scope. Dec 13 02:05:52.227825 systemd-networkd[1030]: calid0c4aecddbf: Link UP Dec 13 02:05:52.238216 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid0c4aecddbf: link becomes ready Dec 13 02:05:52.242660 systemd-networkd[1030]: calid0c4aecddbf: Gained carrier Dec 13 02:05:52.268795 env[1236]: 2024-12-13 02:05:51.982 [INFO][3877] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 02:05:52.268795 env[1236]: 2024-12-13 02:05:52.013 [INFO][3877] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--sc7rt-eth0 coredns-7db6d8ff4d- kube-system c096b776-29d3-4474-9cfe-d2efcc213b0d 803 0 2024-12-13 02:05:16 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal coredns-7db6d8ff4d-sc7rt eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calid0c4aecddbf [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="fa54261b26d22f3ce22f9d7f0fb78f1646df904cb7e0e47c3cd92bdc263d866d" Namespace="kube-system" Pod="coredns-7db6d8ff4d-sc7rt" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--sc7rt-" Dec 13 02:05:52.268795 env[1236]: 2024-12-13 02:05:52.013 [INFO][3877] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="fa54261b26d22f3ce22f9d7f0fb78f1646df904cb7e0e47c3cd92bdc263d866d" Namespace="kube-system" Pod="coredns-7db6d8ff4d-sc7rt" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--sc7rt-eth0" Dec 13 02:05:52.268795 env[1236]: 2024-12-13 02:05:52.073 [INFO][3894] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fa54261b26d22f3ce22f9d7f0fb78f1646df904cb7e0e47c3cd92bdc263d866d" HandleID="k8s-pod-network.fa54261b26d22f3ce22f9d7f0fb78f1646df904cb7e0e47c3cd92bdc263d866d" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--sc7rt-eth0" Dec 13 02:05:52.268795 env[1236]: 2024-12-13 02:05:52.089 [INFO][3894] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="fa54261b26d22f3ce22f9d7f0fb78f1646df904cb7e0e47c3cd92bdc263d866d" HandleID="k8s-pod-network.fa54261b26d22f3ce22f9d7f0fb78f1646df904cb7e0e47c3cd92bdc263d866d" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--sc7rt-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000308830), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal", "pod":"coredns-7db6d8ff4d-sc7rt", "timestamp":"2024-12-13 02:05:52.072923979 +0000 UTC"}, Hostname:"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:05:52.268795 env[1236]: 2024-12-13 02:05:52.089 [INFO][3894] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:05:52.268795 env[1236]: 2024-12-13 02:05:52.101 [INFO][3894] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:05:52.268795 env[1236]: 2024-12-13 02:05:52.101 [INFO][3894] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal' Dec 13 02:05:52.268795 env[1236]: 2024-12-13 02:05:52.130 [INFO][3894] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.fa54261b26d22f3ce22f9d7f0fb78f1646df904cb7e0e47c3cd92bdc263d866d" host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:52.268795 env[1236]: 2024-12-13 02:05:52.140 [INFO][3894] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:52.268795 env[1236]: 2024-12-13 02:05:52.149 [INFO][3894] ipam/ipam.go 489: Trying affinity for 192.168.64.64/26 host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:52.268795 env[1236]: 2024-12-13 02:05:52.152 [INFO][3894] ipam/ipam.go 155: Attempting to load block cidr=192.168.64.64/26 host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:52.268795 env[1236]: 2024-12-13 02:05:52.156 [INFO][3894] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.64.64/26 host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:52.268795 env[1236]: 2024-12-13 02:05:52.156 [INFO][3894] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.64.64/26 handle="k8s-pod-network.fa54261b26d22f3ce22f9d7f0fb78f1646df904cb7e0e47c3cd92bdc263d866d" host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:52.268795 env[1236]: 2024-12-13 02:05:52.158 [INFO][3894] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.fa54261b26d22f3ce22f9d7f0fb78f1646df904cb7e0e47c3cd92bdc263d866d Dec 13 02:05:52.268795 env[1236]: 2024-12-13 02:05:52.165 [INFO][3894] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.64.64/26 handle="k8s-pod-network.fa54261b26d22f3ce22f9d7f0fb78f1646df904cb7e0e47c3cd92bdc263d866d" host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:52.268795 env[1236]: 2024-12-13 02:05:52.210 [INFO][3894] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.64.69/26] block=192.168.64.64/26 handle="k8s-pod-network.fa54261b26d22f3ce22f9d7f0fb78f1646df904cb7e0e47c3cd92bdc263d866d" host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:52.268795 env[1236]: 2024-12-13 02:05:52.210 [INFO][3894] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.64.69/26] handle="k8s-pod-network.fa54261b26d22f3ce22f9d7f0fb78f1646df904cb7e0e47c3cd92bdc263d866d" host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:52.268795 env[1236]: 2024-12-13 02:05:52.210 [INFO][3894] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:05:52.268795 env[1236]: 2024-12-13 02:05:52.210 [INFO][3894] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.64.69/26] IPv6=[] ContainerID="fa54261b26d22f3ce22f9d7f0fb78f1646df904cb7e0e47c3cd92bdc263d866d" HandleID="k8s-pod-network.fa54261b26d22f3ce22f9d7f0fb78f1646df904cb7e0e47c3cd92bdc263d866d" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--sc7rt-eth0" Dec 13 02:05:52.270446 env[1236]: 2024-12-13 02:05:52.216 [INFO][3877] cni-plugin/k8s.go 386: Populated endpoint ContainerID="fa54261b26d22f3ce22f9d7f0fb78f1646df904cb7e0e47c3cd92bdc263d866d" Namespace="kube-system" Pod="coredns-7db6d8ff4d-sc7rt" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--sc7rt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--sc7rt-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"c096b776-29d3-4474-9cfe-d2efcc213b0d", ResourceVersion:"803", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal", ContainerID:"", Pod:"coredns-7db6d8ff4d-sc7rt", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid0c4aecddbf", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:05:52.270446 env[1236]: 2024-12-13 02:05:52.219 [INFO][3877] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.64.69/32] ContainerID="fa54261b26d22f3ce22f9d7f0fb78f1646df904cb7e0e47c3cd92bdc263d866d" Namespace="kube-system" Pod="coredns-7db6d8ff4d-sc7rt" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--sc7rt-eth0" Dec 13 02:05:52.270446 env[1236]: 2024-12-13 02:05:52.219 [INFO][3877] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid0c4aecddbf ContainerID="fa54261b26d22f3ce22f9d7f0fb78f1646df904cb7e0e47c3cd92bdc263d866d" Namespace="kube-system" Pod="coredns-7db6d8ff4d-sc7rt" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--sc7rt-eth0" Dec 13 02:05:52.270446 env[1236]: 2024-12-13 02:05:52.244 [INFO][3877] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="fa54261b26d22f3ce22f9d7f0fb78f1646df904cb7e0e47c3cd92bdc263d866d" Namespace="kube-system" Pod="coredns-7db6d8ff4d-sc7rt" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--sc7rt-eth0" Dec 13 02:05:52.270446 env[1236]: 2024-12-13 02:05:52.244 [INFO][3877] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="fa54261b26d22f3ce22f9d7f0fb78f1646df904cb7e0e47c3cd92bdc263d866d" Namespace="kube-system" Pod="coredns-7db6d8ff4d-sc7rt" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--sc7rt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--sc7rt-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"c096b776-29d3-4474-9cfe-d2efcc213b0d", ResourceVersion:"803", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal", ContainerID:"fa54261b26d22f3ce22f9d7f0fb78f1646df904cb7e0e47c3cd92bdc263d866d", Pod:"coredns-7db6d8ff4d-sc7rt", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid0c4aecddbf", MAC:"da:c5:bd:fd:48:19", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:05:52.270446 env[1236]: 2024-12-13 02:05:52.266 [INFO][3877] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="fa54261b26d22f3ce22f9d7f0fb78f1646df904cb7e0e47c3cd92bdc263d866d" Namespace="kube-system" Pod="coredns-7db6d8ff4d-sc7rt" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--sc7rt-eth0" Dec 13 02:05:52.332330 env[1236]: time="2024-12-13T02:05:52.330933356Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:05:52.332330 env[1236]: time="2024-12-13T02:05:52.330994956Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:05:52.332330 env[1236]: time="2024-12-13T02:05:52.331013482Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:05:52.332330 env[1236]: time="2024-12-13T02:05:52.331406726Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fa54261b26d22f3ce22f9d7f0fb78f1646df904cb7e0e47c3cd92bdc263d866d pid=3960 runtime=io.containerd.runc.v2 Dec 13 02:05:52.372884 systemd[1]: Started cri-containerd-fa54261b26d22f3ce22f9d7f0fb78f1646df904cb7e0e47c3cd92bdc263d866d.scope. Dec 13 02:05:52.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.412000 audit: BPF prog-id=158 op=LOAD Dec 13 02:05:52.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.418000 audit: BPF prog-id=159 op=LOAD Dec 13 02:05:52.420000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.420000 audit[3930]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3919 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.420000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663393135303465303634616439616664356335636333633461643238 Dec 13 02:05:52.420000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.420000 audit[3930]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3919 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.420000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663393135303465303634616439616664356335636333633461643238 Dec 13 02:05:52.420000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.420000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.420000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.420000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.420000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.420000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.420000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.420000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.420000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.420000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.420000 audit: BPF prog-id=160 op=LOAD Dec 13 02:05:52.420000 audit[3930]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00027fd30 items=0 ppid=3919 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.420000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663393135303465303634616439616664356335636333633461643238 Dec 13 02:05:52.420000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.420000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.420000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.420000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.420000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.420000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.420000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.420000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.420000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.420000 audit: BPF prog-id=161 op=LOAD Dec 13 02:05:52.420000 audit[3930]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00027fd78 items=0 ppid=3919 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.420000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663393135303465303634616439616664356335636333633461643238 Dec 13 02:05:52.420000 audit: BPF prog-id=161 op=UNLOAD Dec 13 02:05:52.420000 audit: BPF prog-id=160 op=UNLOAD Dec 13 02:05:52.421000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.421000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.421000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.421000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.421000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.421000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.421000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.421000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.421000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.421000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.421000 audit: BPF prog-id=162 op=LOAD Dec 13 02:05:52.421000 audit[3930]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003f6188 items=0 ppid=3919 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663393135303465303634616439616664356335636333633461643238 Dec 13 02:05:52.424000 audit[3971]: AVC avc: denied { bpf } for pid=3971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.424000 audit[3971]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3960 pid=3971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661353432363162323664323266336365323266396437663066623738 Dec 13 02:05:52.426000 audit[3971]: AVC avc: denied { perfmon } for pid=3971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.426000 audit[3971]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3960 pid=3971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.426000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661353432363162323664323266336365323266396437663066623738 Dec 13 02:05:52.427000 audit[3971]: AVC avc: denied { bpf } for pid=3971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.427000 audit[3971]: AVC avc: denied { bpf } for pid=3971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.427000 audit[3971]: AVC avc: denied { bpf } for pid=3971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.427000 audit[3971]: AVC avc: denied { perfmon } for pid=3971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.427000 audit[3971]: AVC avc: denied { perfmon } for pid=3971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.427000 audit[3971]: AVC avc: denied { perfmon } for pid=3971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.427000 audit[3971]: AVC avc: denied { perfmon } for pid=3971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.427000 audit[3971]: AVC avc: denied { perfmon } for pid=3971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.427000 audit[3971]: AVC avc: denied { bpf } for pid=3971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.427000 audit[3971]: AVC avc: denied { bpf } for pid=3971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.427000 audit: BPF prog-id=163 op=LOAD Dec 13 02:05:52.427000 audit[3971]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c00038a560 items=0 ppid=3960 pid=3971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.427000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661353432363162323664323266336365323266396437663066623738 Dec 13 02:05:52.428000 audit[3971]: AVC avc: denied { bpf } for pid=3971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.428000 audit[3971]: AVC avc: denied { bpf } for pid=3971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.428000 audit[3971]: AVC avc: denied { perfmon } for pid=3971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.428000 audit[3971]: AVC avc: denied { perfmon } for pid=3971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.428000 audit[3971]: AVC avc: denied { perfmon } for pid=3971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.428000 audit[3971]: AVC avc: denied { perfmon } for pid=3971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.428000 audit[3971]: AVC avc: denied { perfmon } for pid=3971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.428000 audit[3971]: AVC avc: denied { bpf } for pid=3971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.428000 audit[3971]: AVC avc: denied { bpf } for pid=3971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.428000 audit: BPF prog-id=164 op=LOAD Dec 13 02:05:52.428000 audit[3971]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c00038a5a8 items=0 ppid=3960 pid=3971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661353432363162323664323266336365323266396437663066623738 Dec 13 02:05:52.429000 audit: BPF prog-id=164 op=UNLOAD Dec 13 02:05:52.429000 audit: BPF prog-id=163 op=UNLOAD Dec 13 02:05:52.429000 audit[3971]: AVC avc: denied { bpf } for pid=3971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.429000 audit[3971]: AVC avc: denied { bpf } for pid=3971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.429000 audit[3971]: AVC avc: denied { bpf } for pid=3971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.429000 audit[3971]: AVC avc: denied { perfmon } for pid=3971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.429000 audit[3971]: AVC avc: denied { perfmon } for pid=3971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.429000 audit[3971]: AVC avc: denied { perfmon } for pid=3971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.429000 audit[3971]: AVC avc: denied { perfmon } for pid=3971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.429000 audit[3971]: AVC avc: denied { perfmon } for pid=3971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.429000 audit[3971]: AVC avc: denied { bpf } for pid=3971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.429000 audit[3971]: AVC avc: denied { bpf } for pid=3971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.429000 audit: BPF prog-id=165 op=LOAD Dec 13 02:05:52.429000 audit[3971]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c00038a9b8 items=0 ppid=3960 pid=3971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661353432363162323664323266336365323266396437663066623738 Dec 13 02:05:52.467079 systemd[1]: run-netns-cni\x2dc4861f56\x2dec1a\x2dd3bc\x2d0a4a\x2d5cc59f1c8aaf.mount: Deactivated successfully. Dec 13 02:05:52.557526 env[1236]: time="2024-12-13T02:05:52.552549540Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-sc7rt,Uid:c096b776-29d3-4474-9cfe-d2efcc213b0d,Namespace:kube-system,Attempt:1,} returns sandbox id \"fa54261b26d22f3ce22f9d7f0fb78f1646df904cb7e0e47c3cd92bdc263d866d\"" Dec 13 02:05:52.561216 env[1236]: time="2024-12-13T02:05:52.559893908Z" level=info msg="CreateContainer within sandbox \"fa54261b26d22f3ce22f9d7f0fb78f1646df904cb7e0e47c3cd92bdc263d866d\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 02:05:52.602086 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount774196714.mount: Deactivated successfully. Dec 13 02:05:52.607607 kubelet[2120]: I1213 02:05:52.606867 2120 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-xmdl8" podStartSLOduration=36.606839356 podStartE2EDuration="36.606839356s" podCreationTimestamp="2024-12-13 02:05:16 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:05:52.565953604 +0000 UTC m=+51.476505248" watchObservedRunningTime="2024-12-13 02:05:52.606839356 +0000 UTC m=+51.517390998" Dec 13 02:05:52.628844 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3968172208.mount: Deactivated successfully. Dec 13 02:05:52.652143 env[1236]: time="2024-12-13T02:05:52.651393791Z" level=info msg="CreateContainer within sandbox \"fa54261b26d22f3ce22f9d7f0fb78f1646df904cb7e0e47c3cd92bdc263d866d\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"86050785b54ba21413bb83a548981b158723df222e06c363ae57f4cf74ece865\"" Dec 13 02:05:52.653694 env[1236]: time="2024-12-13T02:05:52.653594684Z" level=info msg="StartContainer for \"86050785b54ba21413bb83a548981b158723df222e06c363ae57f4cf74ece865\"" Dec 13 02:05:52.672842 env[1236]: time="2024-12-13T02:05:52.667400765Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-64b855cb6f-ttx6t,Uid:d1071b53-347f-4a14-9f06-84454932b905,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"fc91504e064ad9afd5c5cc3c4ad28b15b13f9e7b14ca16e965fd7a6d4844f5cf\"" Dec 13 02:05:52.672752 systemd-networkd[1030]: cali963f6e237ff: Gained IPv6LL Dec 13 02:05:52.701734 systemd[1]: Started cri-containerd-86050785b54ba21413bb83a548981b158723df222e06c363ae57f4cf74ece865.scope. Dec 13 02:05:52.705000 audit[4027]: NETFILTER_CFG table=filter:95 family=2 entries=18 op=nft_register_rule pid=4027 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:52.705000 audit[4027]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffc335593a0 a2=0 a3=7ffc3355938c items=0 ppid=2267 pid=4027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.705000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:52.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.738000 audit: BPF prog-id=166 op=LOAD Dec 13 02:05:52.739000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.739000 audit[4022]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3960 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836303530373835623534626132313431336262383361353438393831 Dec 13 02:05:52.740000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.740000 audit[4022]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3960 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836303530373835623534626132313431336262383361353438393831 Dec 13 02:05:52.740000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.740000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.740000 audit[4027]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=4027 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:52.740000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.740000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.740000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.740000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.740000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.740000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.740000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.740000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.740000 audit: BPF prog-id=167 op=LOAD Dec 13 02:05:52.740000 audit[4027]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc335593a0 a2=0 a3=0 items=0 ppid=2267 pid=4027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.740000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:52.740000 audit[4022]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00033f200 items=0 ppid=3960 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836303530373835623534626132313431336262383361353438393831 Dec 13 02:05:52.743000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.743000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.743000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.743000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.743000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.743000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.743000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.743000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.743000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.743000 audit: BPF prog-id=168 op=LOAD Dec 13 02:05:52.743000 audit[4022]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00033f248 items=0 ppid=3960 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836303530373835623534626132313431336262383361353438393831 Dec 13 02:05:52.746000 audit: BPF prog-id=168 op=UNLOAD Dec 13 02:05:52.746000 audit: BPF prog-id=167 op=UNLOAD Dec 13 02:05:52.746000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.746000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.746000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.746000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.746000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.746000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.746000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.746000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.746000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.746000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.746000 audit: BPF prog-id=169 op=LOAD Dec 13 02:05:52.746000 audit[4022]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00033f658 items=0 ppid=3960 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836303530373835623534626132313431336262383361353438393831 Dec 13 02:05:52.773000 audit[4048]: NETFILTER_CFG table=filter:97 family=2 entries=15 op=nft_register_rule pid=4048 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:52.773000 audit[4048]: SYSCALL arch=c000003e syscall=46 success=yes exit=4420 a0=3 a1=7ffc4a2fbde0 a2=0 a3=7ffc4a2fbdcc items=0 ppid=2267 pid=4048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.773000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:52.783000 audit[4048]: NETFILTER_CFG table=nat:98 family=2 entries=33 op=nft_register_chain pid=4048 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:52.783000 audit[4048]: SYSCALL arch=c000003e syscall=46 success=yes exit=13428 a0=3 a1=7ffc4a2fbde0 a2=0 a3=7ffc4a2fbdcc items=0 ppid=2267 pid=4048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.783000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:52.789381 env[1236]: time="2024-12-13T02:05:52.789324811Z" level=info msg="StartContainer for \"86050785b54ba21413bb83a548981b158723df222e06c363ae57f4cf74ece865\" returns successfully" Dec 13 02:05:53.070746 env[1236]: time="2024-12-13T02:05:53.070674728Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:53.073325 env[1236]: time="2024-12-13T02:05:53.073266825Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:53.075675 env[1236]: time="2024-12-13T02:05:53.075622108Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:53.077874 env[1236]: time="2024-12-13T02:05:53.077830381Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:53.078562 env[1236]: time="2024-12-13T02:05:53.078512465Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 02:05:53.080929 env[1236]: time="2024-12-13T02:05:53.080873397Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 02:05:53.083139 env[1236]: time="2024-12-13T02:05:53.083059799Z" level=info msg="CreateContainer within sandbox \"d56f65a97103555104993df021a887733c10448fb162dccf9bb4d21a27c66cad\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 02:05:53.104604 env[1236]: time="2024-12-13T02:05:53.104517999Z" level=info msg="CreateContainer within sandbox \"d56f65a97103555104993df021a887733c10448fb162dccf9bb4d21a27c66cad\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"b524ec2f4fdf7c6c3b2a8108a0a7109292f3ead04effe45886c5744d4dbe1be0\"" Dec 13 02:05:53.105629 env[1236]: time="2024-12-13T02:05:53.105584471Z" level=info msg="StartContainer for \"b524ec2f4fdf7c6c3b2a8108a0a7109292f3ead04effe45886c5744d4dbe1be0\"" Dec 13 02:05:53.132840 systemd[1]: Started cri-containerd-b524ec2f4fdf7c6c3b2a8108a0a7109292f3ead04effe45886c5744d4dbe1be0.scope. Dec 13 02:05:53.161000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.161000 audit[4077]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f9cb776c2f8 items=0 ppid=3650 pid=4077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:53.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235323465633266346664663763366333623261383130386130613731 Dec 13 02:05:53.161000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.161000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.161000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.161000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.161000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.161000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.161000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.161000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.161000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.161000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.161000 audit: BPF prog-id=170 op=LOAD Dec 13 02:05:53.161000 audit[4077]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000024258 items=0 ppid=3650 pid=4077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:53.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235323465633266346664663763366333623261383130386130613731 Dec 13 02:05:53.163000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.163000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.163000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.163000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.163000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.163000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.163000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.163000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.163000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.163000 audit: BPF prog-id=171 op=LOAD Dec 13 02:05:53.163000 audit[4077]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0000242a8 items=0 ppid=3650 pid=4077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:53.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235323465633266346664663763366333623261383130386130613731 Dec 13 02:05:53.164000 audit: BPF prog-id=171 op=UNLOAD Dec 13 02:05:53.164000 audit: BPF prog-id=170 op=UNLOAD Dec 13 02:05:53.164000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.164000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.164000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.164000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.164000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.164000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.164000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.164000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.164000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.164000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.164000 audit: BPF prog-id=172 op=LOAD Dec 13 02:05:53.164000 audit[4077]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000024338 items=0 ppid=3650 pid=4077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:53.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235323465633266346664663763366333623261383130386130613731 Dec 13 02:05:53.186598 env[1236]: time="2024-12-13T02:05:53.186429989Z" level=info msg="StartContainer for \"b524ec2f4fdf7c6c3b2a8108a0a7109292f3ead04effe45886c5744d4dbe1be0\" returns successfully" Dec 13 02:05:53.245522 env[1236]: time="2024-12-13T02:05:53.245470073Z" level=info msg="StopPodSandbox for \"b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd\"" Dec 13 02:05:53.363193 env[1236]: 2024-12-13 02:05:53.307 [INFO][4119] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd" Dec 13 02:05:53.363193 env[1236]: 2024-12-13 02:05:53.308 [INFO][4119] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd" iface="eth0" netns="/var/run/netns/cni-7a47f7d5-dc13-0e8d-bef9-e0a6fc3aadae" Dec 13 02:05:53.363193 env[1236]: 2024-12-13 02:05:53.308 [INFO][4119] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd" iface="eth0" netns="/var/run/netns/cni-7a47f7d5-dc13-0e8d-bef9-e0a6fc3aadae" Dec 13 02:05:53.363193 env[1236]: 2024-12-13 02:05:53.310 [INFO][4119] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd" iface="eth0" netns="/var/run/netns/cni-7a47f7d5-dc13-0e8d-bef9-e0a6fc3aadae" Dec 13 02:05:53.363193 env[1236]: 2024-12-13 02:05:53.310 [INFO][4119] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd" Dec 13 02:05:53.363193 env[1236]: 2024-12-13 02:05:53.310 [INFO][4119] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd" Dec 13 02:05:53.363193 env[1236]: 2024-12-13 02:05:53.345 [INFO][4125] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd" HandleID="k8s-pod-network.b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--8p75j-eth0" Dec 13 02:05:53.363193 env[1236]: 2024-12-13 02:05:53.345 [INFO][4125] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:05:53.363193 env[1236]: 2024-12-13 02:05:53.345 [INFO][4125] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:05:53.363193 env[1236]: 2024-12-13 02:05:53.353 [WARNING][4125] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd" HandleID="k8s-pod-network.b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--8p75j-eth0" Dec 13 02:05:53.363193 env[1236]: 2024-12-13 02:05:53.353 [INFO][4125] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd" HandleID="k8s-pod-network.b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--8p75j-eth0" Dec 13 02:05:53.363193 env[1236]: 2024-12-13 02:05:53.359 [INFO][4125] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:05:53.363193 env[1236]: 2024-12-13 02:05:53.361 [INFO][4119] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd" Dec 13 02:05:53.363193 env[1236]: time="2024-12-13T02:05:53.362568029Z" level=info msg="TearDown network for sandbox \"b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd\" successfully" Dec 13 02:05:53.363193 env[1236]: time="2024-12-13T02:05:53.362616812Z" level=info msg="StopPodSandbox for \"b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd\" returns successfully" Dec 13 02:05:53.366272 env[1236]: time="2024-12-13T02:05:53.366154936Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-64b855cb6f-8p75j,Uid:fe66513c-b2a4-427a-9ba0-77738873dfe3,Namespace:calico-apiserver,Attempt:1,}" Dec 13 02:05:53.461959 systemd[1]: run-netns-cni\x2d7a47f7d5\x2ddc13\x2d0e8d\x2dbef9\x2de0a6fc3aadae.mount: Deactivated successfully. Dec 13 02:05:53.505792 systemd-networkd[1030]: cali48ad7098410: Gained IPv6LL Dec 13 02:05:53.532608 systemd-networkd[1030]: cali3a19cb04d15: Link UP Dec 13 02:05:53.549686 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:05:53.549838 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3a19cb04d15: link becomes ready Dec 13 02:05:53.550939 systemd-networkd[1030]: cali3a19cb04d15: Gained carrier Dec 13 02:05:53.578135 kubelet[2120]: I1213 02:05:53.578034 2120 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-sc7rt" podStartSLOduration=37.57797278 podStartE2EDuration="37.57797278s" podCreationTimestamp="2024-12-13 02:05:16 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:05:53.573931009 +0000 UTC m=+52.484482672" watchObservedRunningTime="2024-12-13 02:05:53.57797278 +0000 UTC m=+52.488524428" Dec 13 02:05:53.582086 env[1236]: 2024-12-13 02:05:53.411 [INFO][4132] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 02:05:53.582086 env[1236]: 2024-12-13 02:05:53.427 [INFO][4132] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--8p75j-eth0 calico-apiserver-64b855cb6f- calico-apiserver fe66513c-b2a4-427a-9ba0-77738873dfe3 833 0 2024-12-13 02:05:26 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:64b855cb6f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal calico-apiserver-64b855cb6f-8p75j eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali3a19cb04d15 [] []}} ContainerID="f9303a008d3f3a5b57fa30becd3efade888b314e574bf82771c3a9f1f2419245" Namespace="calico-apiserver" Pod="calico-apiserver-64b855cb6f-8p75j" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--8p75j-" Dec 13 02:05:53.582086 env[1236]: 2024-12-13 02:05:53.427 [INFO][4132] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="f9303a008d3f3a5b57fa30becd3efade888b314e574bf82771c3a9f1f2419245" Namespace="calico-apiserver" Pod="calico-apiserver-64b855cb6f-8p75j" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--8p75j-eth0" Dec 13 02:05:53.582086 env[1236]: 2024-12-13 02:05:53.483 [INFO][4143] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f9303a008d3f3a5b57fa30becd3efade888b314e574bf82771c3a9f1f2419245" HandleID="k8s-pod-network.f9303a008d3f3a5b57fa30becd3efade888b314e574bf82771c3a9f1f2419245" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--8p75j-eth0" Dec 13 02:05:53.582086 env[1236]: 2024-12-13 02:05:53.495 [INFO][4143] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f9303a008d3f3a5b57fa30becd3efade888b314e574bf82771c3a9f1f2419245" HandleID="k8s-pod-network.f9303a008d3f3a5b57fa30becd3efade888b314e574bf82771c3a9f1f2419245" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--8p75j-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318670), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal", "pod":"calico-apiserver-64b855cb6f-8p75j", "timestamp":"2024-12-13 02:05:53.483675993 +0000 UTC"}, Hostname:"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:05:53.582086 env[1236]: 2024-12-13 02:05:53.495 [INFO][4143] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:05:53.582086 env[1236]: 2024-12-13 02:05:53.495 [INFO][4143] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:05:53.582086 env[1236]: 2024-12-13 02:05:53.495 [INFO][4143] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal' Dec 13 02:05:53.582086 env[1236]: 2024-12-13 02:05:53.497 [INFO][4143] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f9303a008d3f3a5b57fa30becd3efade888b314e574bf82771c3a9f1f2419245" host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:53.582086 env[1236]: 2024-12-13 02:05:53.501 [INFO][4143] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:53.582086 env[1236]: 2024-12-13 02:05:53.506 [INFO][4143] ipam/ipam.go 489: Trying affinity for 192.168.64.64/26 host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:53.582086 env[1236]: 2024-12-13 02:05:53.509 [INFO][4143] ipam/ipam.go 155: Attempting to load block cidr=192.168.64.64/26 host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:53.582086 env[1236]: 2024-12-13 02:05:53.511 [INFO][4143] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.64.64/26 host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:53.582086 env[1236]: 2024-12-13 02:05:53.511 [INFO][4143] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.64.64/26 handle="k8s-pod-network.f9303a008d3f3a5b57fa30becd3efade888b314e574bf82771c3a9f1f2419245" host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:53.582086 env[1236]: 2024-12-13 02:05:53.513 [INFO][4143] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.f9303a008d3f3a5b57fa30becd3efade888b314e574bf82771c3a9f1f2419245 Dec 13 02:05:53.582086 env[1236]: 2024-12-13 02:05:53.517 [INFO][4143] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.64.64/26 handle="k8s-pod-network.f9303a008d3f3a5b57fa30becd3efade888b314e574bf82771c3a9f1f2419245" host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:53.582086 env[1236]: 2024-12-13 02:05:53.526 [INFO][4143] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.64.70/26] block=192.168.64.64/26 handle="k8s-pod-network.f9303a008d3f3a5b57fa30becd3efade888b314e574bf82771c3a9f1f2419245" host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:53.582086 env[1236]: 2024-12-13 02:05:53.526 [INFO][4143] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.64.70/26] handle="k8s-pod-network.f9303a008d3f3a5b57fa30becd3efade888b314e574bf82771c3a9f1f2419245" host="ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal" Dec 13 02:05:53.582086 env[1236]: 2024-12-13 02:05:53.526 [INFO][4143] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:05:53.582086 env[1236]: 2024-12-13 02:05:53.526 [INFO][4143] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.64.70/26] IPv6=[] ContainerID="f9303a008d3f3a5b57fa30becd3efade888b314e574bf82771c3a9f1f2419245" HandleID="k8s-pod-network.f9303a008d3f3a5b57fa30becd3efade888b314e574bf82771c3a9f1f2419245" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--8p75j-eth0" Dec 13 02:05:53.583394 env[1236]: 2024-12-13 02:05:53.528 [INFO][4132] cni-plugin/k8s.go 386: Populated endpoint ContainerID="f9303a008d3f3a5b57fa30becd3efade888b314e574bf82771c3a9f1f2419245" Namespace="calico-apiserver" Pod="calico-apiserver-64b855cb6f-8p75j" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--8p75j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--8p75j-eth0", GenerateName:"calico-apiserver-64b855cb6f-", Namespace:"calico-apiserver", SelfLink:"", UID:"fe66513c-b2a4-427a-9ba0-77738873dfe3", ResourceVersion:"833", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"64b855cb6f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-apiserver-64b855cb6f-8p75j", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.64.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3a19cb04d15", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:05:53.583394 env[1236]: 2024-12-13 02:05:53.528 [INFO][4132] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.64.70/32] ContainerID="f9303a008d3f3a5b57fa30becd3efade888b314e574bf82771c3a9f1f2419245" Namespace="calico-apiserver" Pod="calico-apiserver-64b855cb6f-8p75j" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--8p75j-eth0" Dec 13 02:05:53.583394 env[1236]: 2024-12-13 02:05:53.528 [INFO][4132] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali3a19cb04d15 ContainerID="f9303a008d3f3a5b57fa30becd3efade888b314e574bf82771c3a9f1f2419245" Namespace="calico-apiserver" Pod="calico-apiserver-64b855cb6f-8p75j" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--8p75j-eth0" Dec 13 02:05:53.583394 env[1236]: 2024-12-13 02:05:53.551 [INFO][4132] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f9303a008d3f3a5b57fa30becd3efade888b314e574bf82771c3a9f1f2419245" Namespace="calico-apiserver" Pod="calico-apiserver-64b855cb6f-8p75j" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--8p75j-eth0" Dec 13 02:05:53.583394 env[1236]: 2024-12-13 02:05:53.562 [INFO][4132] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="f9303a008d3f3a5b57fa30becd3efade888b314e574bf82771c3a9f1f2419245" Namespace="calico-apiserver" Pod="calico-apiserver-64b855cb6f-8p75j" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--8p75j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--8p75j-eth0", GenerateName:"calico-apiserver-64b855cb6f-", Namespace:"calico-apiserver", SelfLink:"", UID:"fe66513c-b2a4-427a-9ba0-77738873dfe3", ResourceVersion:"833", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"64b855cb6f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal", ContainerID:"f9303a008d3f3a5b57fa30becd3efade888b314e574bf82771c3a9f1f2419245", Pod:"calico-apiserver-64b855cb6f-8p75j", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.64.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3a19cb04d15", MAC:"7e:3a:51:8f:39:50", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:05:53.583394 env[1236]: 2024-12-13 02:05:53.579 [INFO][4132] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="f9303a008d3f3a5b57fa30becd3efade888b314e574bf82771c3a9f1f2419245" Namespace="calico-apiserver" Pod="calico-apiserver-64b855cb6f-8p75j" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--8p75j-eth0" Dec 13 02:05:53.616893 env[1236]: time="2024-12-13T02:05:53.616659629Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:05:53.619266 env[1236]: time="2024-12-13T02:05:53.617197090Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:05:53.619449 env[1236]: time="2024-12-13T02:05:53.619274770Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:05:53.622066 env[1236]: time="2024-12-13T02:05:53.619561520Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f9303a008d3f3a5b57fa30becd3efade888b314e574bf82771c3a9f1f2419245 pid=4170 runtime=io.containerd.runc.v2 Dec 13 02:05:53.638000 audit[4174]: NETFILTER_CFG table=filter:99 family=2 entries=12 op=nft_register_rule pid=4174 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:53.638000 audit[4174]: SYSCALL arch=c000003e syscall=46 success=yes exit=4420 a0=3 a1=7fff36a244b0 a2=0 a3=7fff36a2449c items=0 ppid=2267 pid=4174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:53.638000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:53.661000 audit[4174]: NETFILTER_CFG table=nat:100 family=2 entries=42 op=nft_register_rule pid=4174 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:53.661000 audit[4174]: SYSCALL arch=c000003e syscall=46 success=yes exit=13428 a0=3 a1=7fff36a244b0 a2=0 a3=7fff36a2449c items=0 ppid=2267 pid=4174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:53.661000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:53.665464 systemd[1]: Started cri-containerd-f9303a008d3f3a5b57fa30becd3efade888b314e574bf82771c3a9f1f2419245.scope. Dec 13 02:05:53.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.693000 audit: BPF prog-id=173 op=LOAD Dec 13 02:05:53.694000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.694000 audit[4180]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4170 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:53.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639333033613030386433663361356235376661333062656364336566 Dec 13 02:05:53.694000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.694000 audit[4180]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4170 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:53.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639333033613030386433663361356235376661333062656364336566 Dec 13 02:05:53.694000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.694000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.694000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.694000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.694000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.694000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.694000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.694000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.694000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.694000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.694000 audit: BPF prog-id=174 op=LOAD Dec 13 02:05:53.694000 audit[4180]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000389040 items=0 ppid=4170 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:53.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639333033613030386433663361356235376661333062656364336566 Dec 13 02:05:53.694000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.694000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.694000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.694000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.694000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.694000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.694000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.694000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.694000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.694000 audit: BPF prog-id=175 op=LOAD Dec 13 02:05:53.694000 audit[4180]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000389088 items=0 ppid=4170 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:53.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639333033613030386433663361356235376661333062656364336566 Dec 13 02:05:53.694000 audit: BPF prog-id=175 op=UNLOAD Dec 13 02:05:53.694000 audit: BPF prog-id=174 op=UNLOAD Dec 13 02:05:53.694000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.694000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.694000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.694000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.694000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.694000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.694000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.694000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.694000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.694000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.694000 audit: BPF prog-id=176 op=LOAD Dec 13 02:05:53.694000 audit[4180]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000389498 items=0 ppid=4170 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:53.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639333033613030386433663361356235376661333062656364336566 Dec 13 02:05:53.746569 env[1236]: time="2024-12-13T02:05:53.746505983Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-64b855cb6f-8p75j,Uid:fe66513c-b2a4-427a-9ba0-77738873dfe3,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"f9303a008d3f3a5b57fa30becd3efade888b314e574bf82771c3a9f1f2419245\"" Dec 13 02:05:54.081337 systemd-networkd[1030]: calid0c4aecddbf: Gained IPv6LL Dec 13 02:05:54.676000 audit[4226]: NETFILTER_CFG table=filter:101 family=2 entries=12 op=nft_register_rule pid=4226 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:54.676000 audit[4226]: SYSCALL arch=c000003e syscall=46 success=yes exit=4420 a0=3 a1=7ffd30009480 a2=0 a3=7ffd3000946c items=0 ppid=2267 pid=4226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:54.676000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:54.694000 audit[4226]: NETFILTER_CFG table=nat:102 family=2 entries=54 op=nft_register_chain pid=4226 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:54.694000 audit[4226]: SYSCALL arch=c000003e syscall=46 success=yes exit=19092 a0=3 a1=7ffd30009480 a2=0 a3=7ffd3000946c items=0 ppid=2267 pid=4226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:54.694000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:55.296311 systemd-networkd[1030]: cali3a19cb04d15: Gained IPv6LL Dec 13 02:05:55.345293 env[1236]: time="2024-12-13T02:05:55.345222880Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:55.348846 env[1236]: time="2024-12-13T02:05:55.348790672Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:55.351187 env[1236]: time="2024-12-13T02:05:55.351138126Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:55.353483 env[1236]: time="2024-12-13T02:05:55.353427076Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:55.354409 env[1236]: time="2024-12-13T02:05:55.354355851Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 02:05:55.358043 env[1236]: time="2024-12-13T02:05:55.356605200Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 02:05:55.383762 env[1236]: time="2024-12-13T02:05:55.383409369Z" level=info msg="CreateContainer within sandbox \"4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 02:05:55.414333 env[1236]: time="2024-12-13T02:05:55.414265296Z" level=info msg="CreateContainer within sandbox \"4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"6e7f90706cd9bcd2d5838e1ff77c732cb19cb1728eadfbb5f8e6ba0998b5cb60\"" Dec 13 02:05:55.418141 env[1236]: time="2024-12-13T02:05:55.415249056Z" level=info msg="StartContainer for \"6e7f90706cd9bcd2d5838e1ff77c732cb19cb1728eadfbb5f8e6ba0998b5cb60\"" Dec 13 02:05:55.455964 systemd[1]: Started cri-containerd-6e7f90706cd9bcd2d5838e1ff77c732cb19cb1728eadfbb5f8e6ba0998b5cb60.scope. Dec 13 02:05:55.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:55.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:55.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:55.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:55.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:55.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:55.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:55.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:55.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:55.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:55.479000 audit: BPF prog-id=177 op=LOAD Dec 13 02:05:55.480000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:55.480000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3719 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:55.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665376639303730366364396263643264353833386531666637376337 Dec 13 02:05:55.480000 audit[4258]: AVC avc: denied { perfmon } for pid=4258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:55.480000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3719 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:55.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665376639303730366364396263643264353833386531666637376337 Dec 13 02:05:55.480000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:55.480000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:55.480000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:55.480000 audit[4258]: AVC avc: denied { perfmon } for pid=4258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:55.480000 audit[4258]: AVC avc: denied { perfmon } for pid=4258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:55.480000 audit[4258]: AVC avc: denied { perfmon } for pid=4258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:55.480000 audit[4258]: AVC avc: denied { perfmon } for pid=4258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:55.480000 audit[4258]: AVC avc: denied { perfmon } for pid=4258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:55.480000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:55.480000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:55.480000 audit: BPF prog-id=178 op=LOAD Dec 13 02:05:55.480000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00030a380 items=0 ppid=3719 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:55.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665376639303730366364396263643264353833386531666637376337 Dec 13 02:05:55.480000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:55.480000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:55.480000 audit[4258]: AVC avc: denied { perfmon } for pid=4258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:55.480000 audit[4258]: AVC avc: denied { perfmon } for pid=4258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:55.480000 audit[4258]: AVC avc: denied { perfmon } for pid=4258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:55.480000 audit[4258]: AVC avc: denied { perfmon } for pid=4258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:55.480000 audit[4258]: AVC avc: denied { perfmon } for pid=4258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:55.480000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:55.480000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:55.480000 audit: BPF prog-id=179 op=LOAD Dec 13 02:05:55.480000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00030a3c8 items=0 ppid=3719 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:55.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665376639303730366364396263643264353833386531666637376337 Dec 13 02:05:55.480000 audit: BPF prog-id=179 op=UNLOAD Dec 13 02:05:55.480000 audit: BPF prog-id=178 op=UNLOAD Dec 13 02:05:55.480000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:55.480000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:55.480000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:55.480000 audit[4258]: AVC avc: denied { perfmon } for pid=4258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:55.480000 audit[4258]: AVC avc: denied { perfmon } for pid=4258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:55.480000 audit[4258]: AVC avc: denied { perfmon } for pid=4258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:55.480000 audit[4258]: AVC avc: denied { perfmon } for pid=4258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:55.480000 audit[4258]: AVC avc: denied { perfmon } for pid=4258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:55.480000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:55.480000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:55.480000 audit: BPF prog-id=180 op=LOAD Dec 13 02:05:55.480000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00030a7d8 items=0 ppid=3719 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:55.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665376639303730366364396263643264353833386531666637376337 Dec 13 02:05:55.524353 env[1236]: time="2024-12-13T02:05:55.524288925Z" level=info msg="StartContainer for \"6e7f90706cd9bcd2d5838e1ff77c732cb19cb1728eadfbb5f8e6ba0998b5cb60\" returns successfully" Dec 13 02:05:55.612206 kubelet[2120]: I1213 02:05:55.611319 2120 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-dbc6f5ff-k644c" podStartSLOduration=27.003434117 podStartE2EDuration="30.6112915s" podCreationTimestamp="2024-12-13 02:05:25 +0000 UTC" firstStartedPulling="2024-12-13 02:05:51.748165583 +0000 UTC m=+50.658717220" lastFinishedPulling="2024-12-13 02:05:55.35602296 +0000 UTC m=+54.266574603" observedRunningTime="2024-12-13 02:05:55.611264288 +0000 UTC m=+54.521815938" watchObservedRunningTime="2024-12-13 02:05:55.6112915 +0000 UTC m=+54.521843144" Dec 13 02:05:55.888365 kubelet[2120]: I1213 02:05:55.887918 2120 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:05:55.947000 audit[4310]: NETFILTER_CFG table=filter:103 family=2 entries=11 op=nft_register_rule pid=4310 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:55.947000 audit[4310]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffdea9c7c70 a2=0 a3=7ffdea9c7c5c items=0 ppid=2267 pid=4310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:55.947000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:55.953000 audit[4310]: NETFILTER_CFG table=nat:104 family=2 entries=25 op=nft_register_chain pid=4310 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:55.953000 audit[4310]: SYSCALL arch=c000003e syscall=46 success=yes exit=8580 a0=3 a1=7ffdea9c7c70 a2=0 a3=7ffdea9c7c5c items=0 ppid=2267 pid=4310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:55.953000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:56.635008 systemd[1]: run-containerd-runc-k8s.io-6e7f90706cd9bcd2d5838e1ff77c732cb19cb1728eadfbb5f8e6ba0998b5cb60-runc.YxkduY.mount: Deactivated successfully. Dec 13 02:05:56.712184 kernel: kauditd_printk_skb: 576 callbacks suppressed Dec 13 02:05:56.712329 kernel: audit: type=1400 audit(1734055556.684:1189): avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.684000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.684000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.742223 kernel: audit: type=1400 audit(1734055556.684:1189): avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.684000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.772418 kernel: audit: type=1400 audit(1734055556.684:1189): avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.684000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.796237 kernel: audit: type=1400 audit(1734055556.684:1189): avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.684000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.820763 kernel: audit: type=1400 audit(1734055556.684:1189): avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.684000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.684000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.878344 kernel: audit: type=1400 audit(1734055556.684:1189): avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.878506 kernel: audit: type=1400 audit(1734055556.684:1189): avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.878549 kernel: audit: type=1400 audit(1734055556.684:1189): avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.684000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.899189 kernel: audit: type=1400 audit(1734055556.684:1189): avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.684000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.920846 kernel: audit: type=1334 audit(1734055556.684:1189): prog-id=181 op=LOAD Dec 13 02:05:56.684000 audit: BPF prog-id=181 op=LOAD Dec 13 02:05:56.684000 audit[4377]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffa963add0 a2=98 a3=3 items=0 ppid=4324 pid=4377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:56.684000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:56.740000 audit: BPF prog-id=181 op=UNLOAD Dec 13 02:05:56.745000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.745000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.745000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.745000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.745000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.745000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.745000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.745000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.745000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.745000 audit: BPF prog-id=182 op=LOAD Dec 13 02:05:56.745000 audit[4377]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffa963abb0 a2=74 a3=540051 items=0 ppid=4324 pid=4377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:56.745000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:56.745000 audit: BPF prog-id=182 op=UNLOAD Dec 13 02:05:56.745000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.745000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.745000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.745000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.745000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.745000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.745000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.745000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.745000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.745000 audit: BPF prog-id=183 op=LOAD Dec 13 02:05:56.745000 audit[4377]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffa963abe0 a2=94 a3=2 items=0 ppid=4324 pid=4377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:56.745000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:56.745000 audit: BPF prog-id=183 op=UNLOAD Dec 13 02:05:57.482000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.482000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.482000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.482000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.482000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.482000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.482000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.482000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.482000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.482000 audit: BPF prog-id=184 op=LOAD Dec 13 02:05:57.482000 audit[4377]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffa963aaa0 a2=40 a3=1 items=0 ppid=4324 pid=4377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.482000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:57.483000 audit: BPF prog-id=184 op=UNLOAD Dec 13 02:05:57.483000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.483000 audit[4377]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffa963ab70 a2=50 a3=7fffa963ac50 items=0 ppid=4324 pid=4377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.483000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:57.502000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.502000 audit[4377]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffa963aab0 a2=28 a3=0 items=0 ppid=4324 pid=4377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.502000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:57.502000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.502000 audit[4377]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffa963aae0 a2=28 a3=0 items=0 ppid=4324 pid=4377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.502000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:57.503000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.503000 audit[4377]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffa963a9f0 a2=28 a3=0 items=0 ppid=4324 pid=4377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.503000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:57.503000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.503000 audit[4377]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffa963ab00 a2=28 a3=0 items=0 ppid=4324 pid=4377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.503000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:57.503000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.503000 audit[4377]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffa963aae0 a2=28 a3=0 items=0 ppid=4324 pid=4377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.503000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:57.504000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.504000 audit[4377]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffa963aad0 a2=28 a3=0 items=0 ppid=4324 pid=4377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.504000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:57.504000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.504000 audit[4377]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffa963ab00 a2=28 a3=0 items=0 ppid=4324 pid=4377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.504000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:57.505000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.505000 audit[4377]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffa963aae0 a2=28 a3=0 items=0 ppid=4324 pid=4377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.505000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:57.505000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.505000 audit[4377]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffa963ab00 a2=28 a3=0 items=0 ppid=4324 pid=4377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.505000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:57.505000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.505000 audit[4377]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffa963aad0 a2=28 a3=0 items=0 ppid=4324 pid=4377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.505000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:57.506000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.506000 audit[4377]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffa963ab40 a2=28 a3=0 items=0 ppid=4324 pid=4377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.506000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:57.506000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.506000 audit[4377]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffa963a8f0 a2=50 a3=1 items=0 ppid=4324 pid=4377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.506000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:57.507000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.507000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.507000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.507000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.507000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.507000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.507000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.507000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.507000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.507000 audit: BPF prog-id=185 op=LOAD Dec 13 02:05:57.507000 audit[4377]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffa963a8f0 a2=94 a3=5 items=0 ppid=4324 pid=4377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.507000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:57.507000 audit: BPF prog-id=185 op=UNLOAD Dec 13 02:05:57.507000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.507000 audit[4377]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffa963a9a0 a2=50 a3=1 items=0 ppid=4324 pid=4377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.507000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:57.508000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.508000 audit[4377]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fffa963aac0 a2=4 a3=38 items=0 ppid=4324 pid=4377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.508000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:57.508000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.508000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.508000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.508000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.508000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.508000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.508000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.508000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.508000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.508000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.508000 audit[4377]: AVC avc: denied { confidentiality } for pid=4377 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:05:57.508000 audit[4377]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffa963ab10 a2=94 a3=6 items=0 ppid=4324 pid=4377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.508000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:57.510000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.510000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.510000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.510000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.510000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.510000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.510000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.510000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.510000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.510000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.510000 audit[4377]: AVC avc: denied { confidentiality } for pid=4377 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:05:57.510000 audit[4377]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffa963a2c0 a2=94 a3=83 items=0 ppid=4324 pid=4377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.510000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:57.510000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.510000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.510000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.510000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.510000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.510000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.510000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.510000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.510000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.510000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.510000 audit[4377]: AVC avc: denied { confidentiality } for pid=4377 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:05:57.510000 audit[4377]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffa963a2c0 a2=94 a3=83 items=0 ppid=4324 pid=4377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.510000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:57.538000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.538000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.538000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.538000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.538000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.538000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.538000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.538000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.538000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.538000 audit: BPF prog-id=186 op=LOAD Dec 13 02:05:57.538000 audit[4385]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff428b7da0 a2=98 a3=1999999999999999 items=0 ppid=4324 pid=4385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.538000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:05:57.539000 audit: BPF prog-id=186 op=UNLOAD Dec 13 02:05:57.539000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.539000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.539000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.539000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.539000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.539000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.539000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.539000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.539000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.539000 audit: BPF prog-id=187 op=LOAD Dec 13 02:05:57.539000 audit[4385]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff428b7c80 a2=74 a3=ffff items=0 ppid=4324 pid=4385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.539000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:05:57.540000 audit: BPF prog-id=187 op=UNLOAD Dec 13 02:05:57.540000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.540000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.540000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.540000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.540000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.540000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.540000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.540000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.540000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.540000 audit: BPF prog-id=188 op=LOAD Dec 13 02:05:57.540000 audit[4385]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff428b7cc0 a2=40 a3=7fff428b7ea0 items=0 ppid=4324 pid=4385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.540000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:05:57.542000 audit: BPF prog-id=188 op=UNLOAD Dec 13 02:05:57.712656 systemd-networkd[1030]: vxlan.calico: Link UP Dec 13 02:05:57.712673 systemd-networkd[1030]: vxlan.calico: Gained carrier Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit: BPF prog-id=189 op=LOAD Dec 13 02:05:57.769000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff846b9220 a2=98 a3=ffffffff items=0 ppid=4324 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.769000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:05:57.769000 audit: BPF prog-id=189 op=UNLOAD Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit: BPF prog-id=190 op=LOAD Dec 13 02:05:57.769000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff846b9030 a2=74 a3=540051 items=0 ppid=4324 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.769000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:05:57.769000 audit: BPF prog-id=190 op=UNLOAD Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit: BPF prog-id=191 op=LOAD Dec 13 02:05:57.769000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff846b9060 a2=94 a3=2 items=0 ppid=4324 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.769000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:05:57.769000 audit: BPF prog-id=191 op=UNLOAD Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff846b8f30 a2=28 a3=0 items=0 ppid=4324 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.769000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff846b8f60 a2=28 a3=0 items=0 ppid=4324 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.769000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff846b8e70 a2=28 a3=0 items=0 ppid=4324 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.769000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff846b8f80 a2=28 a3=0 items=0 ppid=4324 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.769000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff846b8f60 a2=28 a3=0 items=0 ppid=4324 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.769000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff846b8f50 a2=28 a3=0 items=0 ppid=4324 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.769000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff846b8f80 a2=28 a3=0 items=0 ppid=4324 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.769000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff846b8f60 a2=28 a3=0 items=0 ppid=4324 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.769000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff846b8f80 a2=28 a3=0 items=0 ppid=4324 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.769000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff846b8f50 a2=28 a3=0 items=0 ppid=4324 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.769000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff846b8fc0 a2=28 a3=0 items=0 ppid=4324 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.769000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.769000 audit: BPF prog-id=192 op=LOAD Dec 13 02:05:57.769000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff846b8e30 a2=40 a3=0 items=0 ppid=4324 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.769000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:05:57.780000 audit: BPF prog-id=192 op=UNLOAD Dec 13 02:05:57.781000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.781000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff846b8e20 a2=50 a3=2800 items=0 ppid=4324 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.781000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:05:57.781000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.781000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fff846b8e20 a2=50 a3=2800 items=0 ppid=4324 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.781000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:05:57.781000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.781000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.781000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.781000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.781000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.781000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.781000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.781000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.781000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.781000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.781000 audit: BPF prog-id=193 op=LOAD Dec 13 02:05:57.781000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff846b8640 a2=94 a3=2 items=0 ppid=4324 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.781000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:05:57.781000 audit: BPF prog-id=193 op=UNLOAD Dec 13 02:05:57.781000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.781000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.781000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.781000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.781000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.781000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.781000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.781000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.781000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.781000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.781000 audit: BPF prog-id=194 op=LOAD Dec 13 02:05:57.781000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff846b8740 a2=94 a3=2d items=0 ppid=4324 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.781000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:05:57.794000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.794000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.794000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.794000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.794000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.794000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.794000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.794000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.794000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.794000 audit: BPF prog-id=195 op=LOAD Dec 13 02:05:57.794000 audit[4416]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffa8b92db0 a2=98 a3=0 items=0 ppid=4324 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.794000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:57.794000 audit: BPF prog-id=195 op=UNLOAD Dec 13 02:05:57.794000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.794000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.794000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.794000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.794000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.794000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.794000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.794000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.794000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.794000 audit: BPF prog-id=196 op=LOAD Dec 13 02:05:57.794000 audit[4416]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffa8b92b90 a2=74 a3=540051 items=0 ppid=4324 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.794000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:57.794000 audit: BPF prog-id=196 op=UNLOAD Dec 13 02:05:57.794000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.794000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.794000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.794000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.794000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.794000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.794000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.794000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.794000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.794000 audit: BPF prog-id=197 op=LOAD Dec 13 02:05:57.794000 audit[4416]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffa8b92bc0 a2=94 a3=2 items=0 ppid=4324 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.794000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:57.795000 audit: BPF prog-id=197 op=UNLOAD Dec 13 02:05:57.967000 audit[1969]: AVC avc: denied { watch } for pid=1969 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520982 scontext=system_u:system_r:svirt_lxc_net_t:s0:c681,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:05:57.971000 audit[1969]: AVC avc: denied { watch } for pid=1969 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c681,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:05:57.971000 audit[1969]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002905b90 a2=fc6 a3=0 items=0 ppid=1813 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c681,c864 key=(null) Dec 13 02:05:57.971000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:05:57.967000 audit[1969]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001a0b580 a2=fc6 a3=0 items=0 ppid=1813 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c681,c864 key=(null) Dec 13 02:05:57.967000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:05:58.021000 audit[2014]: AVC avc: denied { watch } for pid=2014 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c86,c871 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:05:58.021000 audit[2014]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00eae4ab0 a2=fc6 a3=0 items=0 ppid=1841 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c86,c871 key=(null) Dec 13 02:05:58.021000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E36002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 02:05:58.087000 audit[2014]: AVC avc: denied { watch } for pid=2014 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c86,c871 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:05:58.087000 audit[2014]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00ef82810 a2=fc6 a3=0 items=0 ppid=1841 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c86,c871 key=(null) Dec 13 02:05:58.087000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E36002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 02:05:58.112000 audit[2014]: AVC avc: denied { watch } for pid=2014 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520990 scontext=system_u:system_r:svirt_lxc_net_t:s0:c86,c871 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:05:58.112000 audit[2014]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00ef82b40 a2=fc6 a3=0 items=0 ppid=1841 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c86,c871 key=(null) Dec 13 02:05:58.112000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E36002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 02:05:58.113000 audit[2014]: AVC avc: denied { watch } for pid=2014 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520982 scontext=system_u:system_r:svirt_lxc_net_t:s0:c86,c871 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:05:58.113000 audit[2014]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00995f080 a2=fc6 a3=0 items=0 ppid=1841 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c86,c871 key=(null) Dec 13 02:05:58.113000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E36002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 02:05:58.178000 audit[2014]: AVC avc: denied { watch } for pid=2014 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520982 scontext=system_u:system_r:svirt_lxc_net_t:s0:c86,c871 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:05:58.178000 audit[2014]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00995fe60 a2=fc6 a3=0 items=0 ppid=1841 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c86,c871 key=(null) Dec 13 02:05:58.178000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E36002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 02:05:58.179000 audit[2014]: AVC avc: denied { watch } for pid=2014 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c86,c871 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:05:58.179000 audit[2014]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00ef83ef0 a2=fc6 a3=0 items=0 ppid=1841 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c86,c871 key=(null) Dec 13 02:05:58.179000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E36002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 02:05:58.209000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.209000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.209000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.209000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.209000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.209000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.209000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.209000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.209000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.209000 audit: BPF prog-id=198 op=LOAD Dec 13 02:05:58.209000 audit[4416]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffa8b92a80 a2=40 a3=1 items=0 ppid=4324 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:58.209000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:58.211000 audit: BPF prog-id=198 op=UNLOAD Dec 13 02:05:58.211000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.211000 audit[4416]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffa8b92b50 a2=50 a3=7fffa8b92c30 items=0 ppid=4324 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:58.211000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:58.237000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.237000 audit[4416]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffa8b92a90 a2=28 a3=0 items=0 ppid=4324 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:58.237000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:58.237000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.237000 audit[4416]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffa8b92ac0 a2=28 a3=0 items=0 ppid=4324 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:58.237000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:58.238000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.238000 audit[4416]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffa8b929d0 a2=28 a3=0 items=0 ppid=4324 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:58.238000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:58.238000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.238000 audit[4416]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffa8b92ae0 a2=28 a3=0 items=0 ppid=4324 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:58.238000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:58.239000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.239000 audit[4416]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffa8b92ac0 a2=28 a3=0 items=0 ppid=4324 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:58.239000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:58.239000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.239000 audit[4416]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffa8b92ab0 a2=28 a3=0 items=0 ppid=4324 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:58.239000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:58.240000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.240000 audit[4416]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffa8b92ae0 a2=28 a3=0 items=0 ppid=4324 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:58.240000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:58.240000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.240000 audit[4416]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffa8b92ac0 a2=28 a3=0 items=0 ppid=4324 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:58.240000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:58.240000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.240000 audit[4416]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffa8b92ae0 a2=28 a3=0 items=0 ppid=4324 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:58.240000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:58.241000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.241000 audit[4416]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffa8b92ab0 a2=28 a3=0 items=0 ppid=4324 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:58.241000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:58.241000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.241000 audit[4416]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffa8b92b20 a2=28 a3=0 items=0 ppid=4324 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:58.241000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:58.242000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.242000 audit[4416]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffa8b928d0 a2=50 a3=1 items=0 ppid=4324 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:58.242000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:58.242000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.242000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.242000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.242000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.242000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.242000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.242000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.242000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.242000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.242000 audit: BPF prog-id=199 op=LOAD Dec 13 02:05:58.242000 audit[4416]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffa8b928d0 a2=94 a3=5 items=0 ppid=4324 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:58.242000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:58.243000 audit: BPF prog-id=199 op=UNLOAD Dec 13 02:05:58.243000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.243000 audit[4416]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffa8b92980 a2=50 a3=1 items=0 ppid=4324 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:58.243000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:58.243000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.243000 audit[4416]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fffa8b92aa0 a2=4 a3=38 items=0 ppid=4324 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:58.243000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:58.243000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.243000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.243000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.243000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.243000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.243000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.243000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.243000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.243000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.243000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.243000 audit[4416]: AVC avc: denied { confidentiality } for pid=4416 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:05:58.243000 audit[4416]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffa8b92af0 a2=94 a3=6 items=0 ppid=4324 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:58.243000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:58.244000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.244000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.244000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.244000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.244000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.244000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.244000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.244000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.244000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.244000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.244000 audit[4416]: AVC avc: denied { confidentiality } for pid=4416 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:05:58.244000 audit[4416]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffa8b922a0 a2=94 a3=83 items=0 ppid=4324 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:58.244000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:58.246000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.246000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.246000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.246000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.246000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.246000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.246000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.246000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.246000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.246000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.246000 audit[4416]: AVC avc: denied { confidentiality } for pid=4416 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:05:58.246000 audit[4416]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffa8b922a0 a2=94 a3=83 items=0 ppid=4324 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:58.246000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:58.247000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.247000 audit[4416]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffa8b93ce0 a2=10 a3=f1f00800 items=0 ppid=4324 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:58.247000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:58.247000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.247000 audit[4416]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffa8b93b80 a2=10 a3=3 items=0 ppid=4324 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:58.247000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:58.247000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.247000 audit[4416]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffa8b93b20 a2=10 a3=3 items=0 ppid=4324 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:58.247000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:58.247000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.247000 audit[4416]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffa8b93b20 a2=10 a3=7 items=0 ppid=4324 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:58.247000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:58.263000 audit: BPF prog-id=194 op=UNLOAD Dec 13 02:05:58.263000 audit[1159]: SYSCALL arch=c000003e syscall=257 success=yes exit=21 a0=ffffff9c a1=560fd5aeee20 a2=80002 a3=0 items=1 ppid=1 pid=1159 auid=4294967295 uid=245 gid=245 euid=245 suid=245 fsuid=245 egid=245 sgid=245 fsgid=245 tty=(none) ses=4294967295 comm="systemd-resolve" exe="/usr/lib/systemd/systemd-resolved" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:58.263000 audit: CWD cwd="/" Dec 13 02:05:58.263000 audit: PATH item=0 name="/proc/thread-self/attr/fscreate" inode=15459 dev=00:36 mode=0100666 ouid=245 ogid=245 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:58.263000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-resolved" Dec 13 02:05:58.491000 audit[4451]: NETFILTER_CFG table=mangle:105 family=2 entries=16 op=nft_register_chain pid=4451 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:05:58.491000 audit[4451]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffd991bb700 a2=0 a3=7ffd991bb6ec items=0 ppid=4324 pid=4451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:58.491000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:05:58.503000 audit[4448]: NETFILTER_CFG table=raw:106 family=2 entries=21 op=nft_register_chain pid=4448 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:05:58.505000 audit[4449]: NETFILTER_CFG table=nat:107 family=2 entries=15 op=nft_register_chain pid=4449 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:05:58.505000 audit[4449]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffe43476440 a2=0 a3=7ffe4347642c items=0 ppid=4324 pid=4449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:58.505000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:05:58.503000 audit[4448]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffe821813a0 a2=0 a3=7ffe8218138c items=0 ppid=4324 pid=4448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:58.503000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:05:58.521000 audit[4452]: NETFILTER_CFG table=filter:108 family=2 entries=215 op=nft_register_chain pid=4452 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:05:58.521000 audit[4452]: SYSCALL arch=c000003e syscall=46 success=yes exit=125772 a0=3 a1=7ffd56dc8910 a2=0 a3=7ffd56dc88fc items=0 ppid=4324 pid=4452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:58.521000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:05:58.706348 env[1236]: time="2024-12-13T02:05:58.706285658Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:58.709218 env[1236]: time="2024-12-13T02:05:58.709168483Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:58.711908 env[1236]: time="2024-12-13T02:05:58.711848301Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:58.714257 env[1236]: time="2024-12-13T02:05:58.714208847Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:58.715056 env[1236]: time="2024-12-13T02:05:58.714999087Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 02:05:58.719581 env[1236]: time="2024-12-13T02:05:58.719542428Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 02:05:58.721685 env[1236]: time="2024-12-13T02:05:58.721523750Z" level=info msg="CreateContainer within sandbox \"fc91504e064ad9afd5c5cc3c4ad28b15b13f9e7b14ca16e965fd7a6d4844f5cf\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 02:05:58.747267 env[1236]: time="2024-12-13T02:05:58.747202269Z" level=info msg="CreateContainer within sandbox \"fc91504e064ad9afd5c5cc3c4ad28b15b13f9e7b14ca16e965fd7a6d4844f5cf\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"39cc8d2d258d74702b4b5132661832c4b791eabbf7ef5abcec2ef1a091eeed08\"" Dec 13 02:05:58.748776 env[1236]: time="2024-12-13T02:05:58.748731868Z" level=info msg="StartContainer for \"39cc8d2d258d74702b4b5132661832c4b791eabbf7ef5abcec2ef1a091eeed08\"" Dec 13 02:05:58.800970 systemd[1]: run-containerd-runc-k8s.io-39cc8d2d258d74702b4b5132661832c4b791eabbf7ef5abcec2ef1a091eeed08-runc.tUkIVt.mount: Deactivated successfully. Dec 13 02:05:58.809928 systemd[1]: Started cri-containerd-39cc8d2d258d74702b4b5132661832c4b791eabbf7ef5abcec2ef1a091eeed08.scope. Dec 13 02:05:58.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.828000 audit: BPF prog-id=200 op=LOAD Dec 13 02:05:58.829000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.829000 audit[4468]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3919 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:58.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339636338643264323538643734373032623462353133323636313833 Dec 13 02:05:58.829000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.829000 audit[4468]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3919 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:58.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339636338643264323538643734373032623462353133323636313833 Dec 13 02:05:58.830000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.830000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.830000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.830000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.830000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.830000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.830000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.830000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.830000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.830000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.830000 audit: BPF prog-id=201 op=LOAD Dec 13 02:05:58.830000 audit[4468]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028f550 items=0 ppid=3919 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:58.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339636338643264323538643734373032623462353133323636313833 Dec 13 02:05:58.830000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.830000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.830000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.830000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.830000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.830000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.830000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.830000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.830000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.830000 audit: BPF prog-id=202 op=LOAD Dec 13 02:05:58.830000 audit[4468]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028f598 items=0 ppid=3919 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:58.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339636338643264323538643734373032623462353133323636313833 Dec 13 02:05:58.830000 audit: BPF prog-id=202 op=UNLOAD Dec 13 02:05:58.830000 audit: BPF prog-id=201 op=UNLOAD Dec 13 02:05:58.830000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.830000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.830000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.830000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.830000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.830000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.830000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.830000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.830000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.830000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.830000 audit: BPF prog-id=203 op=LOAD Dec 13 02:05:58.830000 audit[4468]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028f9a8 items=0 ppid=3919 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:58.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339636338643264323538643734373032623462353133323636313833 Dec 13 02:05:58.874347 env[1236]: time="2024-12-13T02:05:58.874276244Z" level=info msg="StartContainer for \"39cc8d2d258d74702b4b5132661832c4b791eabbf7ef5abcec2ef1a091eeed08\" returns successfully" Dec 13 02:05:59.456333 systemd-networkd[1030]: vxlan.calico: Gained IPv6LL Dec 13 02:05:59.616507 kubelet[2120]: I1213 02:05:59.616426 2120 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-64b855cb6f-ttx6t" podStartSLOduration=27.56943231 podStartE2EDuration="33.616399408s" podCreationTimestamp="2024-12-13 02:05:26 +0000 UTC" firstStartedPulling="2024-12-13 02:05:52.669955686 +0000 UTC m=+51.580507325" lastFinishedPulling="2024-12-13 02:05:58.716922785 +0000 UTC m=+57.627474423" observedRunningTime="2024-12-13 02:05:59.614087456 +0000 UTC m=+58.524639094" watchObservedRunningTime="2024-12-13 02:05:59.616399408 +0000 UTC m=+58.526951056" Dec 13 02:05:59.651000 audit[4499]: NETFILTER_CFG table=filter:109 family=2 entries=10 op=nft_register_rule pid=4499 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:59.651000 audit[4499]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffcc36da060 a2=0 a3=7ffcc36da04c items=0 ppid=2267 pid=4499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:59.651000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:59.662000 audit[4499]: NETFILTER_CFG table=nat:110 family=2 entries=20 op=nft_register_rule pid=4499 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:59.662000 audit[4499]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffcc36da060 a2=0 a3=7ffcc36da04c items=0 ppid=2267 pid=4499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:59.662000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:00.418538 env[1236]: time="2024-12-13T02:06:00.418481523Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:00.423590 env[1236]: time="2024-12-13T02:06:00.423541413Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:00.428025 env[1236]: time="2024-12-13T02:06:00.427975992Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:00.431708 env[1236]: time="2024-12-13T02:06:00.431665205Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:00.432882 env[1236]: time="2024-12-13T02:06:00.432828216Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 02:06:00.436000 env[1236]: time="2024-12-13T02:06:00.435958121Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 02:06:00.437861 env[1236]: time="2024-12-13T02:06:00.437821710Z" level=info msg="CreateContainer within sandbox \"d56f65a97103555104993df021a887733c10448fb162dccf9bb4d21a27c66cad\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 02:06:00.472530 env[1236]: time="2024-12-13T02:06:00.472470378Z" level=info msg="CreateContainer within sandbox \"d56f65a97103555104993df021a887733c10448fb162dccf9bb4d21a27c66cad\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"af71855fee97e93239fc604482ce05b0586222e4a8d0f0410eec756b81ae3be6\"" Dec 13 02:06:00.475131 env[1236]: time="2024-12-13T02:06:00.475070732Z" level=info msg="StartContainer for \"af71855fee97e93239fc604482ce05b0586222e4a8d0f0410eec756b81ae3be6\"" Dec 13 02:06:00.527848 systemd[1]: Started cri-containerd-af71855fee97e93239fc604482ce05b0586222e4a8d0f0410eec756b81ae3be6.scope. Dec 13 02:06:00.550251 systemd[1]: run-containerd-runc-k8s.io-af71855fee97e93239fc604482ce05b0586222e4a8d0f0410eec756b81ae3be6-runc.At1iMg.mount: Deactivated successfully. Dec 13 02:06:00.591000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.591000 audit[4508]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f6b6438b7e8 items=0 ppid=3650 pid=4508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:00.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166373138353566656539376539333233396663363034343832636530 Dec 13 02:06:00.591000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.591000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.591000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.591000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.591000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.591000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.591000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.591000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.591000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.591000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.591000 audit: BPF prog-id=204 op=LOAD Dec 13 02:06:00.591000 audit[4508]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c0002c9b98 items=0 ppid=3650 pid=4508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:00.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166373138353566656539376539333233396663363034343832636530 Dec 13 02:06:00.591000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.591000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.591000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.591000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.591000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.591000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.591000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.591000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.591000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.591000 audit: BPF prog-id=205 op=LOAD Dec 13 02:06:00.591000 audit[4508]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c0002c9be8 items=0 ppid=3650 pid=4508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:00.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166373138353566656539376539333233396663363034343832636530 Dec 13 02:06:00.591000 audit: BPF prog-id=205 op=UNLOAD Dec 13 02:06:00.591000 audit: BPF prog-id=204 op=UNLOAD Dec 13 02:06:00.591000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.591000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.591000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.591000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.591000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.591000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.591000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.591000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.591000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.591000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.591000 audit: BPF prog-id=206 op=LOAD Dec 13 02:06:00.591000 audit[4508]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0002c9c78 items=0 ppid=3650 pid=4508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:00.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166373138353566656539376539333233396663363034343832636530 Dec 13 02:06:00.624641 env[1236]: time="2024-12-13T02:06:00.624564661Z" level=info msg="StartContainer for \"af71855fee97e93239fc604482ce05b0586222e4a8d0f0410eec756b81ae3be6\" returns successfully" Dec 13 02:06:00.633512 env[1236]: time="2024-12-13T02:06:00.633456928Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:00.637428 env[1236]: time="2024-12-13T02:06:00.637377599Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:00.639680 env[1236]: time="2024-12-13T02:06:00.639634189Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:00.642225 env[1236]: time="2024-12-13T02:06:00.642177771Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:00.643802 env[1236]: time="2024-12-13T02:06:00.643745611Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 02:06:00.647737 env[1236]: time="2024-12-13T02:06:00.647690439Z" level=info msg="CreateContainer within sandbox \"f9303a008d3f3a5b57fa30becd3efade888b314e574bf82771c3a9f1f2419245\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 02:06:00.673173 env[1236]: time="2024-12-13T02:06:00.673010201Z" level=info msg="CreateContainer within sandbox \"f9303a008d3f3a5b57fa30becd3efade888b314e574bf82771c3a9f1f2419245\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"666f40ee5637f4ad11259fffc7deb6cd2be639243ba687aa411a26c8256b6b43\"" Dec 13 02:06:00.676187 env[1236]: time="2024-12-13T02:06:00.676136679Z" level=info msg="StartContainer for \"666f40ee5637f4ad11259fffc7deb6cd2be639243ba687aa411a26c8256b6b43\"" Dec 13 02:06:00.706376 systemd[1]: Started cri-containerd-666f40ee5637f4ad11259fffc7deb6cd2be639243ba687aa411a26c8256b6b43.scope. Dec 13 02:06:00.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.740000 audit: BPF prog-id=207 op=LOAD Dec 13 02:06:00.741000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.741000 audit[4545]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4170 pid=4545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:00.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636366634306565353633376634616431313235396666666337646562 Dec 13 02:06:00.741000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.741000 audit[4545]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4170 pid=4545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:00.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636366634306565353633376634616431313235396666666337646562 Dec 13 02:06:00.741000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.741000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.741000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.741000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.741000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.741000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.741000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.741000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.741000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.741000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.741000 audit: BPF prog-id=208 op=LOAD Dec 13 02:06:00.741000 audit[4545]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000290470 items=0 ppid=4170 pid=4545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:00.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636366634306565353633376634616431313235396666666337646562 Dec 13 02:06:00.741000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.741000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.741000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.741000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.741000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.741000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.741000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.741000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.741000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.741000 audit: BPF prog-id=209 op=LOAD Dec 13 02:06:00.741000 audit[4545]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002904b8 items=0 ppid=4170 pid=4545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:00.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636366634306565353633376634616431313235396666666337646562 Dec 13 02:06:00.741000 audit: BPF prog-id=209 op=UNLOAD Dec 13 02:06:00.742000 audit: BPF prog-id=208 op=UNLOAD Dec 13 02:06:00.742000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.742000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.742000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.742000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.742000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.742000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.742000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.742000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.742000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.742000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:00.742000 audit: BPF prog-id=210 op=LOAD Dec 13 02:06:00.742000 audit[4545]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002908c8 items=0 ppid=4170 pid=4545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:00.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636366634306565353633376634616431313235396666666337646562 Dec 13 02:06:00.799597 env[1236]: time="2024-12-13T02:06:00.799531011Z" level=info msg="StartContainer for \"666f40ee5637f4ad11259fffc7deb6cd2be639243ba687aa411a26c8256b6b43\" returns successfully" Dec 13 02:06:01.031000 audit[4478]: AVC avc: denied { watch } for pid=4478 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_05_36.2115515708/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c594 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c489,c594 tclass=file permissive=0 Dec 13 02:06:01.031000 audit[4478]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000bfa400 a2=fc6 a3=0 items=0 ppid=3919 pid=4478 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c594 key=(null) Dec 13 02:06:01.031000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:06:01.099000 audit[4577]: NETFILTER_CFG table=filter:111 family=2 entries=9 op=nft_register_rule pid=4577 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:01.099000 audit[4577]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd9c1de440 a2=0 a3=7ffd9c1de42c items=0 ppid=2267 pid=4577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:01.099000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:01.103000 audit[4577]: NETFILTER_CFG table=nat:112 family=2 entries=27 op=nft_register_chain pid=4577 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:01.103000 audit[4577]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd9c1de440 a2=0 a3=7ffd9c1de42c items=0 ppid=2267 pid=4577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:01.103000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:01.250698 env[1236]: time="2024-12-13T02:06:01.250647514Z" level=info msg="StopPodSandbox for \"b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd\"" Dec 13 02:06:01.357476 kubelet[2120]: I1213 02:06:01.357345 2120 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 02:06:01.357476 kubelet[2120]: I1213 02:06:01.357391 2120 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 02:06:01.414155 env[1236]: 2024-12-13 02:06:01.337 [WARNING][4592] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--8p75j-eth0", GenerateName:"calico-apiserver-64b855cb6f-", Namespace:"calico-apiserver", SelfLink:"", UID:"fe66513c-b2a4-427a-9ba0-77738873dfe3", ResourceVersion:"837", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"64b855cb6f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal", ContainerID:"f9303a008d3f3a5b57fa30becd3efade888b314e574bf82771c3a9f1f2419245", Pod:"calico-apiserver-64b855cb6f-8p75j", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.64.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3a19cb04d15", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:06:01.414155 env[1236]: 2024-12-13 02:06:01.338 [INFO][4592] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd" Dec 13 02:06:01.414155 env[1236]: 2024-12-13 02:06:01.338 [INFO][4592] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd" iface="eth0" netns="" Dec 13 02:06:01.414155 env[1236]: 2024-12-13 02:06:01.338 [INFO][4592] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd" Dec 13 02:06:01.414155 env[1236]: 2024-12-13 02:06:01.338 [INFO][4592] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd" Dec 13 02:06:01.414155 env[1236]: 2024-12-13 02:06:01.396 [INFO][4599] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd" HandleID="k8s-pod-network.b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--8p75j-eth0" Dec 13 02:06:01.414155 env[1236]: 2024-12-13 02:06:01.396 [INFO][4599] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:06:01.414155 env[1236]: 2024-12-13 02:06:01.396 [INFO][4599] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:06:01.414155 env[1236]: 2024-12-13 02:06:01.405 [WARNING][4599] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd" HandleID="k8s-pod-network.b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--8p75j-eth0" Dec 13 02:06:01.414155 env[1236]: 2024-12-13 02:06:01.405 [INFO][4599] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd" HandleID="k8s-pod-network.b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--8p75j-eth0" Dec 13 02:06:01.414155 env[1236]: 2024-12-13 02:06:01.409 [INFO][4599] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:06:01.414155 env[1236]: 2024-12-13 02:06:01.412 [INFO][4592] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd" Dec 13 02:06:01.414965 env[1236]: time="2024-12-13T02:06:01.414179491Z" level=info msg="TearDown network for sandbox \"b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd\" successfully" Dec 13 02:06:01.414965 env[1236]: time="2024-12-13T02:06:01.414224520Z" level=info msg="StopPodSandbox for \"b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd\" returns successfully" Dec 13 02:06:01.415213 env[1236]: time="2024-12-13T02:06:01.415095017Z" level=info msg="RemovePodSandbox for \"b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd\"" Dec 13 02:06:01.415329 env[1236]: time="2024-12-13T02:06:01.415225269Z" level=info msg="Forcibly stopping sandbox \"b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd\"" Dec 13 02:06:01.550173 env[1236]: 2024-12-13 02:06:01.499 [WARNING][4618] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--8p75j-eth0", GenerateName:"calico-apiserver-64b855cb6f-", Namespace:"calico-apiserver", SelfLink:"", UID:"fe66513c-b2a4-427a-9ba0-77738873dfe3", ResourceVersion:"837", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"64b855cb6f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal", ContainerID:"f9303a008d3f3a5b57fa30becd3efade888b314e574bf82771c3a9f1f2419245", Pod:"calico-apiserver-64b855cb6f-8p75j", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.64.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3a19cb04d15", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:06:01.550173 env[1236]: 2024-12-13 02:06:01.500 [INFO][4618] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd" Dec 13 02:06:01.550173 env[1236]: 2024-12-13 02:06:01.500 [INFO][4618] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd" iface="eth0" netns="" Dec 13 02:06:01.550173 env[1236]: 2024-12-13 02:06:01.500 [INFO][4618] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd" Dec 13 02:06:01.550173 env[1236]: 2024-12-13 02:06:01.500 [INFO][4618] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd" Dec 13 02:06:01.550173 env[1236]: 2024-12-13 02:06:01.536 [INFO][4624] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd" HandleID="k8s-pod-network.b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--8p75j-eth0" Dec 13 02:06:01.550173 env[1236]: 2024-12-13 02:06:01.536 [INFO][4624] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:06:01.550173 env[1236]: 2024-12-13 02:06:01.536 [INFO][4624] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:06:01.550173 env[1236]: 2024-12-13 02:06:01.545 [WARNING][4624] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd" HandleID="k8s-pod-network.b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--8p75j-eth0" Dec 13 02:06:01.550173 env[1236]: 2024-12-13 02:06:01.545 [INFO][4624] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd" HandleID="k8s-pod-network.b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--8p75j-eth0" Dec 13 02:06:01.550173 env[1236]: 2024-12-13 02:06:01.547 [INFO][4624] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:06:01.550173 env[1236]: 2024-12-13 02:06:01.549 [INFO][4618] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd" Dec 13 02:06:01.551362 env[1236]: time="2024-12-13T02:06:01.550219661Z" level=info msg="TearDown network for sandbox \"b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd\" successfully" Dec 13 02:06:01.556417 env[1236]: time="2024-12-13T02:06:01.556328149Z" level=info msg="RemovePodSandbox \"b22a1afc0eeefa4fed2b329037c5da8dba518fc23f31e2394f46212ac63f9afd\" returns successfully" Dec 13 02:06:01.557148 env[1236]: time="2024-12-13T02:06:01.557080541Z" level=info msg="StopPodSandbox for \"3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1\"" Dec 13 02:06:01.669126 kubelet[2120]: I1213 02:06:01.667827 2120 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-64b855cb6f-8p75j" podStartSLOduration=28.77186622 podStartE2EDuration="35.667778045s" podCreationTimestamp="2024-12-13 02:05:26 +0000 UTC" firstStartedPulling="2024-12-13 02:05:53.74953364 +0000 UTC m=+52.660085268" lastFinishedPulling="2024-12-13 02:06:00.645445451 +0000 UTC m=+59.555997093" observedRunningTime="2024-12-13 02:06:01.659740052 +0000 UTC m=+60.570291719" watchObservedRunningTime="2024-12-13 02:06:01.667778045 +0000 UTC m=+60.578329694" Dec 13 02:06:01.669126 kubelet[2120]: I1213 02:06:01.668513 2120 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-25lng" podStartSLOduration=27.763891144 podStartE2EDuration="36.668490752s" podCreationTimestamp="2024-12-13 02:05:25 +0000 UTC" firstStartedPulling="2024-12-13 02:05:51.530232801 +0000 UTC m=+50.440784439" lastFinishedPulling="2024-12-13 02:06:00.434832422 +0000 UTC m=+59.345384047" observedRunningTime="2024-12-13 02:06:01.638491621 +0000 UTC m=+60.549043312" watchObservedRunningTime="2024-12-13 02:06:01.668490752 +0000 UTC m=+60.579042407" Dec 13 02:06:01.675000 audit[1969]: AVC avc: denied { watch } for pid=1969 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520982 scontext=system_u:system_r:svirt_lxc_net_t:s0:c681,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:06:01.676000 audit[1969]: AVC avc: denied { watch } for pid=1969 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520982 scontext=system_u:system_r:svirt_lxc_net_t:s0:c681,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:06:01.676000 audit[1969]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001bec520 a2=fc6 a3=0 items=0 ppid=1813 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c681,c864 key=(null) Dec 13 02:06:01.676000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:06:01.676000 audit[1969]: AVC avc: denied { watch } for pid=1969 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520982 scontext=system_u:system_r:svirt_lxc_net_t:s0:c681,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:06:01.676000 audit[1969]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001bec6c0 a2=fc6 a3=0 items=0 ppid=1813 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c681,c864 key=(null) Dec 13 02:06:01.676000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:06:01.676000 audit[1969]: AVC avc: denied { watch } for pid=1969 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520982 scontext=system_u:system_r:svirt_lxc_net_t:s0:c681,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:06:01.676000 audit[1969]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001bec6e0 a2=fc6 a3=0 items=0 ppid=1813 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c681,c864 key=(null) Dec 13 02:06:01.676000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:06:01.675000 audit[1969]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d47c60 a2=fc6 a3=0 items=0 ppid=1813 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c681,c864 key=(null) Dec 13 02:06:01.675000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:06:01.731281 kernel: kauditd_printk_skb: 682 callbacks suppressed Dec 13 02:06:01.731469 kernel: audit: type=1325 audit(1734055561.707:1343): table=filter:113 family=2 entries=8 op=nft_register_rule pid=4657 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:01.707000 audit[4657]: NETFILTER_CFG table=filter:113 family=2 entries=8 op=nft_register_rule pid=4657 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:01.707000 audit[4657]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffca7312370 a2=0 a3=7ffca731235c items=0 ppid=2267 pid=4657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:01.707000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:01.792684 kernel: audit: type=1300 audit(1734055561.707:1343): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffca7312370 a2=0 a3=7ffca731235c items=0 ppid=2267 pid=4657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:01.792829 kernel: audit: type=1327 audit(1734055561.707:1343): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:01.796000 audit[4657]: NETFILTER_CFG table=nat:114 family=2 entries=30 op=nft_register_rule pid=4657 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:01.814147 kernel: audit: type=1325 audit(1734055561.796:1344): table=nat:114 family=2 entries=30 op=nft_register_rule pid=4657 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:01.796000 audit[4657]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffca7312370 a2=0 a3=7ffca731235c items=0 ppid=2267 pid=4657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:01.825814 env[1236]: 2024-12-13 02:06:01.645 [WARNING][4645] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xmdl8-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"1d1a3cd6-7ba6-4d29-a8c4-9d3e0364c3e8", ResourceVersion:"819", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal", ContainerID:"cdcaddcec50b997fb9bd2f741eb62abdc1cf7a5dc05c5f4dcd78776859501286", Pod:"coredns-7db6d8ff4d-xmdl8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3086da20e0f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:06:01.825814 env[1236]: 2024-12-13 02:06:01.654 [INFO][4645] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1" Dec 13 02:06:01.825814 env[1236]: 2024-12-13 02:06:01.654 [INFO][4645] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1" iface="eth0" netns="" Dec 13 02:06:01.825814 env[1236]: 2024-12-13 02:06:01.654 [INFO][4645] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1" Dec 13 02:06:01.825814 env[1236]: 2024-12-13 02:06:01.654 [INFO][4645] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1" Dec 13 02:06:01.825814 env[1236]: 2024-12-13 02:06:01.719 [INFO][4651] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1" HandleID="k8s-pod-network.3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xmdl8-eth0" Dec 13 02:06:01.825814 env[1236]: 2024-12-13 02:06:01.719 [INFO][4651] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:06:01.825814 env[1236]: 2024-12-13 02:06:01.719 [INFO][4651] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:06:01.825814 env[1236]: 2024-12-13 02:06:01.792 [WARNING][4651] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1" HandleID="k8s-pod-network.3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xmdl8-eth0" Dec 13 02:06:01.825814 env[1236]: 2024-12-13 02:06:01.792 [INFO][4651] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1" HandleID="k8s-pod-network.3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xmdl8-eth0" Dec 13 02:06:01.825814 env[1236]: 2024-12-13 02:06:01.814 [INFO][4651] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:06:01.825814 env[1236]: 2024-12-13 02:06:01.824 [INFO][4645] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1" Dec 13 02:06:01.826772 env[1236]: time="2024-12-13T02:06:01.826717372Z" level=info msg="TearDown network for sandbox \"3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1\" successfully" Dec 13 02:06:01.826909 env[1236]: time="2024-12-13T02:06:01.826882878Z" level=info msg="StopPodSandbox for \"3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1\" returns successfully" Dec 13 02:06:01.827543 env[1236]: time="2024-12-13T02:06:01.827508361Z" level=info msg="RemovePodSandbox for \"3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1\"" Dec 13 02:06:01.827764 env[1236]: time="2024-12-13T02:06:01.827704126Z" level=info msg="Forcibly stopping sandbox \"3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1\"" Dec 13 02:06:01.848254 kernel: audit: type=1300 audit(1734055561.796:1344): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffca7312370 a2=0 a3=7ffca731235c items=0 ppid=2267 pid=4657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:01.796000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:01.867330 kernel: audit: type=1327 audit(1734055561.796:1344): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:02.044904 env[1236]: 2024-12-13 02:06:01.983 [WARNING][4674] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xmdl8-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"1d1a3cd6-7ba6-4d29-a8c4-9d3e0364c3e8", ResourceVersion:"819", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal", ContainerID:"cdcaddcec50b997fb9bd2f741eb62abdc1cf7a5dc05c5f4dcd78776859501286", Pod:"coredns-7db6d8ff4d-xmdl8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3086da20e0f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:06:02.044904 env[1236]: 2024-12-13 02:06:01.983 [INFO][4674] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1" Dec 13 02:06:02.044904 env[1236]: 2024-12-13 02:06:01.984 [INFO][4674] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1" iface="eth0" netns="" Dec 13 02:06:02.044904 env[1236]: 2024-12-13 02:06:01.984 [INFO][4674] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1" Dec 13 02:06:02.044904 env[1236]: 2024-12-13 02:06:01.984 [INFO][4674] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1" Dec 13 02:06:02.044904 env[1236]: 2024-12-13 02:06:02.027 [INFO][4680] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1" HandleID="k8s-pod-network.3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xmdl8-eth0" Dec 13 02:06:02.044904 env[1236]: 2024-12-13 02:06:02.028 [INFO][4680] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:06:02.044904 env[1236]: 2024-12-13 02:06:02.028 [INFO][4680] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:06:02.044904 env[1236]: 2024-12-13 02:06:02.040 [WARNING][4680] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1" HandleID="k8s-pod-network.3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xmdl8-eth0" Dec 13 02:06:02.044904 env[1236]: 2024-12-13 02:06:02.040 [INFO][4680] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1" HandleID="k8s-pod-network.3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xmdl8-eth0" Dec 13 02:06:02.044904 env[1236]: 2024-12-13 02:06:02.042 [INFO][4680] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:06:02.044904 env[1236]: 2024-12-13 02:06:02.043 [INFO][4674] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1" Dec 13 02:06:02.045966 env[1236]: time="2024-12-13T02:06:02.045916453Z" level=info msg="TearDown network for sandbox \"3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1\" successfully" Dec 13 02:06:02.056298 env[1236]: time="2024-12-13T02:06:02.056231624Z" level=info msg="RemovePodSandbox \"3ab5bbb57d91b166fc793bc602b6b200a63e92c0cacd842ea381fdb690debfe1\" returns successfully" Dec 13 02:06:02.057607 env[1236]: time="2024-12-13T02:06:02.057449258Z" level=info msg="StopPodSandbox for \"f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2\"" Dec 13 02:06:02.237000 env[1236]: 2024-12-13 02:06:02.157 [WARNING][4700] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--sc7rt-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"c096b776-29d3-4474-9cfe-d2efcc213b0d", ResourceVersion:"840", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal", ContainerID:"fa54261b26d22f3ce22f9d7f0fb78f1646df904cb7e0e47c3cd92bdc263d866d", Pod:"coredns-7db6d8ff4d-sc7rt", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid0c4aecddbf", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:06:02.237000 env[1236]: 2024-12-13 02:06:02.158 [INFO][4700] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2" Dec 13 02:06:02.237000 env[1236]: 2024-12-13 02:06:02.158 [INFO][4700] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2" iface="eth0" netns="" Dec 13 02:06:02.237000 env[1236]: 2024-12-13 02:06:02.158 [INFO][4700] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2" Dec 13 02:06:02.237000 env[1236]: 2024-12-13 02:06:02.158 [INFO][4700] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2" Dec 13 02:06:02.237000 env[1236]: 2024-12-13 02:06:02.206 [INFO][4706] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2" HandleID="k8s-pod-network.f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--sc7rt-eth0" Dec 13 02:06:02.237000 env[1236]: 2024-12-13 02:06:02.207 [INFO][4706] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:06:02.237000 env[1236]: 2024-12-13 02:06:02.207 [INFO][4706] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:06:02.237000 env[1236]: 2024-12-13 02:06:02.231 [WARNING][4706] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2" HandleID="k8s-pod-network.f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--sc7rt-eth0" Dec 13 02:06:02.237000 env[1236]: 2024-12-13 02:06:02.231 [INFO][4706] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2" HandleID="k8s-pod-network.f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--sc7rt-eth0" Dec 13 02:06:02.237000 env[1236]: 2024-12-13 02:06:02.233 [INFO][4706] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:06:02.237000 env[1236]: 2024-12-13 02:06:02.235 [INFO][4700] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2" Dec 13 02:06:02.238029 env[1236]: time="2024-12-13T02:06:02.237972957Z" level=info msg="TearDown network for sandbox \"f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2\" successfully" Dec 13 02:06:02.238202 env[1236]: time="2024-12-13T02:06:02.238170881Z" level=info msg="StopPodSandbox for \"f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2\" returns successfully" Dec 13 02:06:02.238932 env[1236]: time="2024-12-13T02:06:02.238895052Z" level=info msg="RemovePodSandbox for \"f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2\"" Dec 13 02:06:02.239206 env[1236]: time="2024-12-13T02:06:02.239147604Z" level=info msg="Forcibly stopping sandbox \"f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2\"" Dec 13 02:06:02.375998 env[1236]: 2024-12-13 02:06:02.316 [WARNING][4725] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--sc7rt-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"c096b776-29d3-4474-9cfe-d2efcc213b0d", ResourceVersion:"840", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal", ContainerID:"fa54261b26d22f3ce22f9d7f0fb78f1646df904cb7e0e47c3cd92bdc263d866d", Pod:"coredns-7db6d8ff4d-sc7rt", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid0c4aecddbf", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:06:02.375998 env[1236]: 2024-12-13 02:06:02.316 [INFO][4725] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2" Dec 13 02:06:02.375998 env[1236]: 2024-12-13 02:06:02.316 [INFO][4725] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2" iface="eth0" netns="" Dec 13 02:06:02.375998 env[1236]: 2024-12-13 02:06:02.316 [INFO][4725] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2" Dec 13 02:06:02.375998 env[1236]: 2024-12-13 02:06:02.316 [INFO][4725] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2" Dec 13 02:06:02.375998 env[1236]: 2024-12-13 02:06:02.359 [INFO][4731] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2" HandleID="k8s-pod-network.f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--sc7rt-eth0" Dec 13 02:06:02.375998 env[1236]: 2024-12-13 02:06:02.359 [INFO][4731] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:06:02.375998 env[1236]: 2024-12-13 02:06:02.360 [INFO][4731] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:06:02.375998 env[1236]: 2024-12-13 02:06:02.368 [WARNING][4731] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2" HandleID="k8s-pod-network.f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--sc7rt-eth0" Dec 13 02:06:02.375998 env[1236]: 2024-12-13 02:06:02.368 [INFO][4731] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2" HandleID="k8s-pod-network.f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--sc7rt-eth0" Dec 13 02:06:02.375998 env[1236]: 2024-12-13 02:06:02.370 [INFO][4731] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:06:02.375998 env[1236]: 2024-12-13 02:06:02.372 [INFO][4725] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2" Dec 13 02:06:02.377706 env[1236]: time="2024-12-13T02:06:02.377653621Z" level=info msg="TearDown network for sandbox \"f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2\" successfully" Dec 13 02:06:02.382758 env[1236]: time="2024-12-13T02:06:02.382669394Z" level=info msg="RemovePodSandbox \"f15d10a76a6635627b687473fbb6e6436f8c98257631286f3812d6aba2307ec2\" returns successfully" Dec 13 02:06:02.383387 env[1236]: time="2024-12-13T02:06:02.383355105Z" level=info msg="StopPodSandbox for \"e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c\"" Dec 13 02:06:02.508336 env[1236]: 2024-12-13 02:06:02.455 [WARNING][4752] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-csi--node--driver--25lng-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"fe43aeca-7618-49ba-af44-ec58d6fa89be", ResourceVersion:"900", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal", ContainerID:"d56f65a97103555104993df021a887733c10448fb162dccf9bb4d21a27c66cad", Pod:"csi-node-driver-25lng", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.64.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali963f6e237ff", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:06:02.508336 env[1236]: 2024-12-13 02:06:02.455 [INFO][4752] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c" Dec 13 02:06:02.508336 env[1236]: 2024-12-13 02:06:02.456 [INFO][4752] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c" iface="eth0" netns="" Dec 13 02:06:02.508336 env[1236]: 2024-12-13 02:06:02.456 [INFO][4752] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c" Dec 13 02:06:02.508336 env[1236]: 2024-12-13 02:06:02.456 [INFO][4752] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c" Dec 13 02:06:02.508336 env[1236]: 2024-12-13 02:06:02.494 [INFO][4759] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c" HandleID="k8s-pod-network.e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-csi--node--driver--25lng-eth0" Dec 13 02:06:02.508336 env[1236]: 2024-12-13 02:06:02.495 [INFO][4759] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:06:02.508336 env[1236]: 2024-12-13 02:06:02.495 [INFO][4759] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:06:02.508336 env[1236]: 2024-12-13 02:06:02.502 [WARNING][4759] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c" HandleID="k8s-pod-network.e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-csi--node--driver--25lng-eth0" Dec 13 02:06:02.508336 env[1236]: 2024-12-13 02:06:02.502 [INFO][4759] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c" HandleID="k8s-pod-network.e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-csi--node--driver--25lng-eth0" Dec 13 02:06:02.508336 env[1236]: 2024-12-13 02:06:02.504 [INFO][4759] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:06:02.508336 env[1236]: 2024-12-13 02:06:02.506 [INFO][4752] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c" Dec 13 02:06:02.509251 env[1236]: time="2024-12-13T02:06:02.508359709Z" level=info msg="TearDown network for sandbox \"e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c\" successfully" Dec 13 02:06:02.509251 env[1236]: time="2024-12-13T02:06:02.508405963Z" level=info msg="StopPodSandbox for \"e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c\" returns successfully" Dec 13 02:06:02.509928 env[1236]: time="2024-12-13T02:06:02.509883198Z" level=info msg="RemovePodSandbox for \"e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c\"" Dec 13 02:06:02.510074 env[1236]: time="2024-12-13T02:06:02.509932631Z" level=info msg="Forcibly stopping sandbox \"e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c\"" Dec 13 02:06:02.625798 env[1236]: 2024-12-13 02:06:02.570 [WARNING][4777] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-csi--node--driver--25lng-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"fe43aeca-7618-49ba-af44-ec58d6fa89be", ResourceVersion:"900", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal", ContainerID:"d56f65a97103555104993df021a887733c10448fb162dccf9bb4d21a27c66cad", Pod:"csi-node-driver-25lng", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.64.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali963f6e237ff", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:06:02.625798 env[1236]: 2024-12-13 02:06:02.570 [INFO][4777] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c" Dec 13 02:06:02.625798 env[1236]: 2024-12-13 02:06:02.571 [INFO][4777] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c" iface="eth0" netns="" Dec 13 02:06:02.625798 env[1236]: 2024-12-13 02:06:02.571 [INFO][4777] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c" Dec 13 02:06:02.625798 env[1236]: 2024-12-13 02:06:02.571 [INFO][4777] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c" Dec 13 02:06:02.625798 env[1236]: 2024-12-13 02:06:02.606 [INFO][4783] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c" HandleID="k8s-pod-network.e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-csi--node--driver--25lng-eth0" Dec 13 02:06:02.625798 env[1236]: 2024-12-13 02:06:02.607 [INFO][4783] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:06:02.625798 env[1236]: 2024-12-13 02:06:02.607 [INFO][4783] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:06:02.625798 env[1236]: 2024-12-13 02:06:02.619 [WARNING][4783] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c" HandleID="k8s-pod-network.e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-csi--node--driver--25lng-eth0" Dec 13 02:06:02.625798 env[1236]: 2024-12-13 02:06:02.619 [INFO][4783] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c" HandleID="k8s-pod-network.e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-csi--node--driver--25lng-eth0" Dec 13 02:06:02.625798 env[1236]: 2024-12-13 02:06:02.621 [INFO][4783] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:06:02.625798 env[1236]: 2024-12-13 02:06:02.623 [INFO][4777] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c" Dec 13 02:06:02.629854 env[1236]: time="2024-12-13T02:06:02.627215365Z" level=info msg="TearDown network for sandbox \"e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c\" successfully" Dec 13 02:06:02.639223 env[1236]: time="2024-12-13T02:06:02.639169346Z" level=info msg="RemovePodSandbox \"e0b50a8f76e401f1ba875d5362dead28bd374dc45692edf2ec351f547b2a759c\" returns successfully" Dec 13 02:06:02.640280 env[1236]: time="2024-12-13T02:06:02.640237657Z" level=info msg="StopPodSandbox for \"23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79\"" Dec 13 02:06:02.790358 env[1236]: 2024-12-13 02:06:02.742 [WARNING][4801] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbc6f5ff--k644c-eth0", GenerateName:"calico-kube-controllers-dbc6f5ff-", Namespace:"calico-system", SelfLink:"", UID:"ab5406ea-be6d-43ba-ad0a-95a82cc144df", ResourceVersion:"865", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"dbc6f5ff", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal", ContainerID:"4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155", Pod:"calico-kube-controllers-dbc6f5ff-k644c", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.64.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali1a7de5fa6d7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:06:02.790358 env[1236]: 2024-12-13 02:06:02.742 [INFO][4801] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79" Dec 13 02:06:02.790358 env[1236]: 2024-12-13 02:06:02.742 [INFO][4801] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79" iface="eth0" netns="" Dec 13 02:06:02.790358 env[1236]: 2024-12-13 02:06:02.742 [INFO][4801] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79" Dec 13 02:06:02.790358 env[1236]: 2024-12-13 02:06:02.742 [INFO][4801] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79" Dec 13 02:06:02.790358 env[1236]: 2024-12-13 02:06:02.778 [INFO][4807] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79" HandleID="k8s-pod-network.23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbc6f5ff--k644c-eth0" Dec 13 02:06:02.790358 env[1236]: 2024-12-13 02:06:02.778 [INFO][4807] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:06:02.790358 env[1236]: 2024-12-13 02:06:02.778 [INFO][4807] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:06:02.790358 env[1236]: 2024-12-13 02:06:02.785 [WARNING][4807] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79" HandleID="k8s-pod-network.23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbc6f5ff--k644c-eth0" Dec 13 02:06:02.790358 env[1236]: 2024-12-13 02:06:02.785 [INFO][4807] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79" HandleID="k8s-pod-network.23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbc6f5ff--k644c-eth0" Dec 13 02:06:02.790358 env[1236]: 2024-12-13 02:06:02.787 [INFO][4807] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:06:02.790358 env[1236]: 2024-12-13 02:06:02.788 [INFO][4801] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79" Dec 13 02:06:02.790358 env[1236]: time="2024-12-13T02:06:02.790317684Z" level=info msg="TearDown network for sandbox \"23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79\" successfully" Dec 13 02:06:02.791344 env[1236]: time="2024-12-13T02:06:02.790370523Z" level=info msg="StopPodSandbox for \"23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79\" returns successfully" Dec 13 02:06:02.791344 env[1236]: time="2024-12-13T02:06:02.791150714Z" level=info msg="RemovePodSandbox for \"23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79\"" Dec 13 02:06:02.791344 env[1236]: time="2024-12-13T02:06:02.791196550Z" level=info msg="Forcibly stopping sandbox \"23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79\"" Dec 13 02:06:02.926000 audit[4555]: AVC avc: denied { watch } for pid=4555 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_05_36.2707603075/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c579,c596 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c579,c596 tclass=file permissive=0 Dec 13 02:06:02.958414 kernel: audit: type=1400 audit(1734055562.926:1345): avc: denied { watch } for pid=4555 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_05_36.2707603075/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c579,c596 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c579,c596 tclass=file permissive=0 Dec 13 02:06:02.926000 audit[4555]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000a7a080 a2=fc6 a3=0 items=0 ppid=4170 pid=4555 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c579,c596 key=(null) Dec 13 02:06:02.994141 kernel: audit: type=1300 audit(1734055562.926:1345): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000a7a080 a2=fc6 a3=0 items=0 ppid=4170 pid=4555 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c579,c596 key=(null) Dec 13 02:06:03.005195 env[1236]: 2024-12-13 02:06:02.859 [WARNING][4826] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbc6f5ff--k644c-eth0", GenerateName:"calico-kube-controllers-dbc6f5ff-", Namespace:"calico-system", SelfLink:"", UID:"ab5406ea-be6d-43ba-ad0a-95a82cc144df", ResourceVersion:"865", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"dbc6f5ff", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal", ContainerID:"4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155", Pod:"calico-kube-controllers-dbc6f5ff-k644c", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.64.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali1a7de5fa6d7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:06:03.005195 env[1236]: 2024-12-13 02:06:02.860 [INFO][4826] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79" Dec 13 02:06:03.005195 env[1236]: 2024-12-13 02:06:02.860 [INFO][4826] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79" iface="eth0" netns="" Dec 13 02:06:03.005195 env[1236]: 2024-12-13 02:06:02.860 [INFO][4826] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79" Dec 13 02:06:03.005195 env[1236]: 2024-12-13 02:06:02.860 [INFO][4826] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79" Dec 13 02:06:03.005195 env[1236]: 2024-12-13 02:06:02.932 [INFO][4832] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79" HandleID="k8s-pod-network.23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbc6f5ff--k644c-eth0" Dec 13 02:06:03.005195 env[1236]: 2024-12-13 02:06:02.933 [INFO][4832] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:06:03.005195 env[1236]: 2024-12-13 02:06:02.933 [INFO][4832] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:06:03.005195 env[1236]: 2024-12-13 02:06:02.999 [WARNING][4832] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79" HandleID="k8s-pod-network.23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbc6f5ff--k644c-eth0" Dec 13 02:06:03.005195 env[1236]: 2024-12-13 02:06:02.999 [INFO][4832] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79" HandleID="k8s-pod-network.23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbc6f5ff--k644c-eth0" Dec 13 02:06:03.005195 env[1236]: 2024-12-13 02:06:03.001 [INFO][4832] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:06:03.005195 env[1236]: 2024-12-13 02:06:03.003 [INFO][4826] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79" Dec 13 02:06:03.006351 env[1236]: time="2024-12-13T02:06:03.006296493Z" level=info msg="TearDown network for sandbox \"23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79\" successfully" Dec 13 02:06:02.926000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:06:03.045148 kernel: audit: type=1327 audit(1734055562.926:1345): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:06:03.045421 env[1236]: time="2024-12-13T02:06:03.045360897Z" level=info msg="RemovePodSandbox \"23c7cc5655a05af14ee6f617e395df42876e249e50ccb53abcfed1fcf09e6b79\" returns successfully" Dec 13 02:06:03.046382 env[1236]: time="2024-12-13T02:06:03.046338983Z" level=info msg="StopPodSandbox for \"07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4\"" Dec 13 02:06:03.056000 audit[4850]: NETFILTER_CFG table=filter:115 family=2 entries=8 op=nft_register_rule pid=4850 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:03.074262 kernel: audit: type=1325 audit(1734055563.056:1346): table=filter:115 family=2 entries=8 op=nft_register_rule pid=4850 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:03.056000 audit[4850]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffee51fb820 a2=0 a3=7ffee51fb80c items=0 ppid=2267 pid=4850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:03.056000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:03.077000 audit[4850]: NETFILTER_CFG table=nat:116 family=2 entries=34 op=nft_register_chain pid=4850 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:03.077000 audit[4850]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffee51fb820 a2=0 a3=7ffee51fb80c items=0 ppid=2267 pid=4850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:03.077000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:03.150087 env[1236]: 2024-12-13 02:06:03.109 [WARNING][4854] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--ttx6t-eth0", GenerateName:"calico-apiserver-64b855cb6f-", Namespace:"calico-apiserver", SelfLink:"", UID:"d1071b53-347f-4a14-9f06-84454932b905", ResourceVersion:"889", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"64b855cb6f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal", ContainerID:"fc91504e064ad9afd5c5cc3c4ad28b15b13f9e7b14ca16e965fd7a6d4844f5cf", Pod:"calico-apiserver-64b855cb6f-ttx6t", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.64.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali48ad7098410", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:06:03.150087 env[1236]: 2024-12-13 02:06:03.109 [INFO][4854] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4" Dec 13 02:06:03.150087 env[1236]: 2024-12-13 02:06:03.109 [INFO][4854] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4" iface="eth0" netns="" Dec 13 02:06:03.150087 env[1236]: 2024-12-13 02:06:03.109 [INFO][4854] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4" Dec 13 02:06:03.150087 env[1236]: 2024-12-13 02:06:03.109 [INFO][4854] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4" Dec 13 02:06:03.150087 env[1236]: 2024-12-13 02:06:03.138 [INFO][4860] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4" HandleID="k8s-pod-network.07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--ttx6t-eth0" Dec 13 02:06:03.150087 env[1236]: 2024-12-13 02:06:03.138 [INFO][4860] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:06:03.150087 env[1236]: 2024-12-13 02:06:03.138 [INFO][4860] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:06:03.150087 env[1236]: 2024-12-13 02:06:03.145 [WARNING][4860] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4" HandleID="k8s-pod-network.07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--ttx6t-eth0" Dec 13 02:06:03.150087 env[1236]: 2024-12-13 02:06:03.145 [INFO][4860] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4" HandleID="k8s-pod-network.07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--ttx6t-eth0" Dec 13 02:06:03.150087 env[1236]: 2024-12-13 02:06:03.147 [INFO][4860] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:06:03.150087 env[1236]: 2024-12-13 02:06:03.148 [INFO][4854] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4" Dec 13 02:06:03.151024 env[1236]: time="2024-12-13T02:06:03.150171661Z" level=info msg="TearDown network for sandbox \"07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4\" successfully" Dec 13 02:06:03.151024 env[1236]: time="2024-12-13T02:06:03.150227616Z" level=info msg="StopPodSandbox for \"07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4\" returns successfully" Dec 13 02:06:03.151228 env[1236]: time="2024-12-13T02:06:03.151013171Z" level=info msg="RemovePodSandbox for \"07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4\"" Dec 13 02:06:03.151228 env[1236]: time="2024-12-13T02:06:03.151062958Z" level=info msg="Forcibly stopping sandbox \"07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4\"" Dec 13 02:06:03.251385 env[1236]: 2024-12-13 02:06:03.202 [WARNING][4878] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--ttx6t-eth0", GenerateName:"calico-apiserver-64b855cb6f-", Namespace:"calico-apiserver", SelfLink:"", UID:"d1071b53-347f-4a14-9f06-84454932b905", ResourceVersion:"889", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"64b855cb6f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal", ContainerID:"fc91504e064ad9afd5c5cc3c4ad28b15b13f9e7b14ca16e965fd7a6d4844f5cf", Pod:"calico-apiserver-64b855cb6f-ttx6t", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.64.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali48ad7098410", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:06:03.251385 env[1236]: 2024-12-13 02:06:03.202 [INFO][4878] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4" Dec 13 02:06:03.251385 env[1236]: 2024-12-13 02:06:03.202 [INFO][4878] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4" iface="eth0" netns="" Dec 13 02:06:03.251385 env[1236]: 2024-12-13 02:06:03.202 [INFO][4878] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4" Dec 13 02:06:03.251385 env[1236]: 2024-12-13 02:06:03.202 [INFO][4878] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4" Dec 13 02:06:03.251385 env[1236]: 2024-12-13 02:06:03.235 [INFO][4884] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4" HandleID="k8s-pod-network.07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--ttx6t-eth0" Dec 13 02:06:03.251385 env[1236]: 2024-12-13 02:06:03.235 [INFO][4884] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:06:03.251385 env[1236]: 2024-12-13 02:06:03.235 [INFO][4884] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:06:03.251385 env[1236]: 2024-12-13 02:06:03.242 [WARNING][4884] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4" HandleID="k8s-pod-network.07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--ttx6t-eth0" Dec 13 02:06:03.251385 env[1236]: 2024-12-13 02:06:03.242 [INFO][4884] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4" HandleID="k8s-pod-network.07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--apiserver--64b855cb6f--ttx6t-eth0" Dec 13 02:06:03.251385 env[1236]: 2024-12-13 02:06:03.245 [INFO][4884] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:06:03.251385 env[1236]: 2024-12-13 02:06:03.246 [INFO][4878] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4" Dec 13 02:06:03.253017 env[1236]: time="2024-12-13T02:06:03.252967699Z" level=info msg="TearDown network for sandbox \"07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4\" successfully" Dec 13 02:06:03.258310 env[1236]: time="2024-12-13T02:06:03.258251543Z" level=info msg="RemovePodSandbox \"07b638dbf46413f7af00a585252422bb5636400acce58518d49f1609410f19c4\" returns successfully" Dec 13 02:06:06.519437 systemd[1]: run-containerd-runc-k8s.io-6e7f90706cd9bcd2d5838e1ff77c732cb19cb1728eadfbb5f8e6ba0998b5cb60-runc.oxGKgA.mount: Deactivated successfully. Dec 13 02:06:10.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.6:22-139.178.68.195:42834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:10.227347 systemd[1]: Started sshd@7-10.128.0.6:22-139.178.68.195:42834.service. Dec 13 02:06:10.234453 kernel: kauditd_printk_skb: 5 callbacks suppressed Dec 13 02:06:10.234617 kernel: audit: type=1130 audit(1734055570.226:1348): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.6:22-139.178.68.195:42834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:10.555275 kernel: audit: type=1101 audit(1734055570.524:1349): pid=4930 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:10.524000 audit[4930]: USER_ACCT pid=4930 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:10.556445 sshd[4930]: Accepted publickey for core from 139.178.68.195 port 42834 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:06:10.556281 sshd[4930]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:06:10.554000 audit[4930]: CRED_ACQ pid=4930 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:10.572226 systemd-logind[1221]: New session 8 of user core. Dec 13 02:06:10.576481 systemd[1]: Started session-8.scope. Dec 13 02:06:10.584155 kernel: audit: type=1103 audit(1734055570.554:1350): pid=4930 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:10.602356 kernel: audit: type=1006 audit(1734055570.554:1351): pid=4930 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 Dec 13 02:06:10.602506 kernel: audit: type=1300 audit(1734055570.554:1351): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc171402a0 a2=3 a3=0 items=0 ppid=1 pid=4930 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:10.554000 audit[4930]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc171402a0 a2=3 a3=0 items=0 ppid=1 pid=4930 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:10.554000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:10.640360 kernel: audit: type=1327 audit(1734055570.554:1351): proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:10.594000 audit[4930]: USER_START pid=4930 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:10.672875 kernel: audit: type=1105 audit(1734055570.594:1352): pid=4930 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:10.597000 audit[4932]: CRED_ACQ pid=4932 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:10.698139 kernel: audit: type=1103 audit(1734055570.597:1353): pid=4932 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:10.897917 sshd[4930]: pam_unix(sshd:session): session closed for user core Dec 13 02:06:10.900000 audit[4930]: USER_END pid=4930 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:10.935150 kernel: audit: type=1106 audit(1734055570.900:1354): pid=4930 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:10.937865 systemd-logind[1221]: Session 8 logged out. Waiting for processes to exit. Dec 13 02:06:10.938508 systemd[1]: sshd@7-10.128.0.6:22-139.178.68.195:42834.service: Deactivated successfully. Dec 13 02:06:10.939722 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 02:06:10.941847 systemd-logind[1221]: Removed session 8. Dec 13 02:06:10.900000 audit[4930]: CRED_DISP pid=4930 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:10.937000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.6:22-139.178.68.195:42834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:10.970139 kernel: audit: type=1104 audit(1734055570.900:1355): pid=4930 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:15.947269 systemd[1]: Started sshd@8-10.128.0.6:22-139.178.68.195:42840.service. Dec 13 02:06:15.978546 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 02:06:15.978620 kernel: audit: type=1130 audit(1734055575.947:1357): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.6:22-139.178.68.195:42840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:15.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.6:22-139.178.68.195:42840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:16.246000 audit[4948]: USER_ACCT pid=4948 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:16.249911 sshd[4948]: Accepted publickey for core from 139.178.68.195 port 42840 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:06:16.278457 kernel: audit: type=1101 audit(1734055576.246:1358): pid=4948 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:16.279013 sshd[4948]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:06:16.287843 systemd[1]: Started session-9.scope. Dec 13 02:06:16.289039 systemd-logind[1221]: New session 9 of user core. Dec 13 02:06:16.276000 audit[4948]: CRED_ACQ pid=4948 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:16.318180 kernel: audit: type=1103 audit(1734055576.276:1359): pid=4948 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:16.276000 audit[4948]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff89e58d80 a2=3 a3=0 items=0 ppid=1 pid=4948 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:16.376495 kernel: audit: type=1006 audit(1734055576.276:1360): pid=4948 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Dec 13 02:06:16.376682 kernel: audit: type=1300 audit(1734055576.276:1360): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff89e58d80 a2=3 a3=0 items=0 ppid=1 pid=4948 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:16.376751 kernel: audit: type=1327 audit(1734055576.276:1360): proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:16.276000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:16.319000 audit[4948]: USER_START pid=4948 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:16.322000 audit[4950]: CRED_ACQ pid=4950 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:16.446135 kernel: audit: type=1105 audit(1734055576.319:1361): pid=4948 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:16.446326 kernel: audit: type=1103 audit(1734055576.322:1362): pid=4950 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:16.665411 sshd[4948]: pam_unix(sshd:session): session closed for user core Dec 13 02:06:16.666000 audit[4948]: USER_END pid=4948 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:16.671432 systemd-logind[1221]: Session 9 logged out. Waiting for processes to exit. Dec 13 02:06:16.674674 systemd[1]: sshd@8-10.128.0.6:22-139.178.68.195:42840.service: Deactivated successfully. Dec 13 02:06:16.675945 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 02:06:16.678187 systemd-logind[1221]: Removed session 9. Dec 13 02:06:16.666000 audit[4948]: CRED_DISP pid=4948 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:16.724983 kernel: audit: type=1106 audit(1734055576.666:1363): pid=4948 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:16.725169 kernel: audit: type=1104 audit(1734055576.666:1364): pid=4948 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:16.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.6:22-139.178.68.195:42840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:18.645996 systemd[1]: run-containerd-runc-k8s.io-6ed3452c5b5a4793680bd922c9e9bebb39e3172741e5bd0529ab4c55940322f9-runc.L6EAvU.mount: Deactivated successfully. Dec 13 02:06:21.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.6:22-139.178.68.195:33022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:21.714014 systemd[1]: Started sshd@9-10.128.0.6:22-139.178.68.195:33022.service. Dec 13 02:06:21.720248 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 02:06:21.720404 kernel: audit: type=1130 audit(1734055581.713:1366): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.6:22-139.178.68.195:33022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:22.014000 audit[4993]: USER_ACCT pid=4993 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:22.045404 sshd[4993]: Accepted publickey for core from 139.178.68.195 port 33022 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:06:22.046273 kernel: audit: type=1101 audit(1734055582.014:1367): pid=4993 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:22.050883 sshd[4993]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:06:22.049000 audit[4993]: CRED_ACQ pid=4993 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:22.074780 systemd[1]: Started session-10.scope. Dec 13 02:06:22.076605 systemd-logind[1221]: New session 10 of user core. Dec 13 02:06:22.078158 kernel: audit: type=1103 audit(1734055582.049:1368): pid=4993 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:22.049000 audit[4993]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa131a5e0 a2=3 a3=0 items=0 ppid=1 pid=4993 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:22.123448 kernel: audit: type=1006 audit(1734055582.049:1369): pid=4993 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Dec 13 02:06:22.123624 kernel: audit: type=1300 audit(1734055582.049:1369): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa131a5e0 a2=3 a3=0 items=0 ppid=1 pid=4993 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:22.123674 kernel: audit: type=1327 audit(1734055582.049:1369): proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:22.049000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:22.133348 kernel: audit: type=1105 audit(1734055582.087:1370): pid=4993 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:22.087000 audit[4993]: USER_START pid=4993 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:22.090000 audit[4995]: CRED_ACQ pid=4995 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:22.166172 kernel: audit: type=1103 audit(1734055582.090:1371): pid=4995 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:22.342774 sshd[4993]: pam_unix(sshd:session): session closed for user core Dec 13 02:06:22.343000 audit[4993]: USER_END pid=4993 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:22.347113 systemd[1]: sshd@9-10.128.0.6:22-139.178.68.195:33022.service: Deactivated successfully. Dec 13 02:06:22.349994 systemd-logind[1221]: Session 10 logged out. Waiting for processes to exit. Dec 13 02:06:22.343000 audit[4993]: CRED_DISP pid=4993 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:22.379892 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 02:06:22.382126 systemd-logind[1221]: Removed session 10. Dec 13 02:06:22.404187 kernel: audit: type=1106 audit(1734055582.343:1372): pid=4993 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:22.404398 kernel: audit: type=1104 audit(1734055582.343:1373): pid=4993 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:22.345000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.6:22-139.178.68.195:33022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:22.411651 systemd[1]: Started sshd@10-10.128.0.6:22-139.178.68.195:33030.service. Dec 13 02:06:22.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.6:22-139.178.68.195:33030 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:22.707000 audit[5007]: USER_ACCT pid=5007 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:22.710286 sshd[5007]: Accepted publickey for core from 139.178.68.195 port 33030 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:06:22.709000 audit[5007]: CRED_ACQ pid=5007 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:22.709000 audit[5007]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe215c6fb0 a2=3 a3=0 items=0 ppid=1 pid=5007 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:22.709000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:22.711612 sshd[5007]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:06:22.718234 systemd-logind[1221]: New session 11 of user core. Dec 13 02:06:22.718953 systemd[1]: Started session-11.scope. Dec 13 02:06:22.726000 audit[5007]: USER_START pid=5007 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:22.729000 audit[5009]: CRED_ACQ pid=5009 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:23.053203 sshd[5007]: pam_unix(sshd:session): session closed for user core Dec 13 02:06:23.053000 audit[5007]: USER_END pid=5007 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:23.054000 audit[5007]: CRED_DISP pid=5007 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:23.058300 systemd[1]: sshd@10-10.128.0.6:22-139.178.68.195:33030.service: Deactivated successfully. Dec 13 02:06:23.059596 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 02:06:23.057000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.6:22-139.178.68.195:33030 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:23.060195 systemd-logind[1221]: Session 11 logged out. Waiting for processes to exit. Dec 13 02:06:23.061722 systemd-logind[1221]: Removed session 11. Dec 13 02:06:23.100205 systemd[1]: Started sshd@11-10.128.0.6:22-139.178.68.195:33040.service. Dec 13 02:06:23.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.6:22-139.178.68.195:33040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:23.393000 audit[5017]: USER_ACCT pid=5017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:23.395408 sshd[5017]: Accepted publickey for core from 139.178.68.195 port 33040 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:06:23.396000 audit[5017]: CRED_ACQ pid=5017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:23.396000 audit[5017]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0e2af6c0 a2=3 a3=0 items=0 ppid=1 pid=5017 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:23.396000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:23.398376 sshd[5017]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:06:23.405893 systemd[1]: Started session-12.scope. Dec 13 02:06:23.407044 systemd-logind[1221]: New session 12 of user core. Dec 13 02:06:23.414000 audit[5017]: USER_START pid=5017 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:23.417000 audit[5019]: CRED_ACQ pid=5019 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:23.691611 sshd[5017]: pam_unix(sshd:session): session closed for user core Dec 13 02:06:23.693000 audit[5017]: USER_END pid=5017 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:23.693000 audit[5017]: CRED_DISP pid=5017 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:23.697476 systemd-logind[1221]: Session 12 logged out. Waiting for processes to exit. Dec 13 02:06:23.697743 systemd[1]: sshd@11-10.128.0.6:22-139.178.68.195:33040.service: Deactivated successfully. Dec 13 02:06:23.699043 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 02:06:23.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.6:22-139.178.68.195:33040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:23.700642 systemd-logind[1221]: Removed session 12. Dec 13 02:06:26.314733 env[1236]: time="2024-12-13T02:06:26.314665610Z" level=info msg="StopContainer for \"0497e657404f10e117514b85d2a47789a8beb5e1135c9ac6d8163420d35a79ba\" with timeout 300 (s)" Dec 13 02:06:26.315404 env[1236]: time="2024-12-13T02:06:26.315340794Z" level=info msg="Stop container \"0497e657404f10e117514b85d2a47789a8beb5e1135c9ac6d8163420d35a79ba\" with signal terminated" Dec 13 02:06:26.380000 audit[5037]: NETFILTER_CFG table=filter:117 family=2 entries=8 op=nft_register_rule pid=5037 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:26.380000 audit[5037]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff82c7ad50 a2=0 a3=7fff82c7ad3c items=0 ppid=2267 pid=5037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:26.380000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:26.396000 audit[5037]: NETFILTER_CFG table=nat:118 family=2 entries=30 op=nft_register_rule pid=5037 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:26.396000 audit[5037]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fff82c7ad50 a2=0 a3=7fff82c7ad3c items=0 ppid=2267 pid=5037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:26.396000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:26.417000 audit[5039]: NETFILTER_CFG table=filter:119 family=2 entries=8 op=nft_register_rule pid=5039 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:26.417000 audit[5039]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff6d28ed00 a2=0 a3=7fff6d28ecec items=0 ppid=2267 pid=5039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:26.417000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:26.428000 audit[5039]: NETFILTER_CFG table=nat:120 family=2 entries=30 op=nft_register_rule pid=5039 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:26.428000 audit[5039]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fff6d28ed00 a2=0 a3=7fff6d28ecec items=0 ppid=2267 pid=5039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:26.428000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:26.529680 env[1236]: time="2024-12-13T02:06:26.529619268Z" level=info msg="StopContainer for \"6e7f90706cd9bcd2d5838e1ff77c732cb19cb1728eadfbb5f8e6ba0998b5cb60\" with timeout 30 (s)" Dec 13 02:06:26.530695 env[1236]: time="2024-12-13T02:06:26.530644136Z" level=info msg="Stop container \"6e7f90706cd9bcd2d5838e1ff77c732cb19cb1728eadfbb5f8e6ba0998b5cb60\" with signal terminated" Dec 13 02:06:26.574340 systemd[1]: cri-containerd-6e7f90706cd9bcd2d5838e1ff77c732cb19cb1728eadfbb5f8e6ba0998b5cb60.scope: Deactivated successfully. Dec 13 02:06:26.573000 audit: BPF prog-id=177 op=UNLOAD Dec 13 02:06:26.577000 audit: BPF prog-id=180 op=UNLOAD Dec 13 02:06:26.614504 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-6e7f90706cd9bcd2d5838e1ff77c732cb19cb1728eadfbb5f8e6ba0998b5cb60-rootfs.mount: Deactivated successfully. Dec 13 02:06:26.706561 env[1236]: time="2024-12-13T02:06:26.706494033Z" level=info msg="shim disconnected" id=6e7f90706cd9bcd2d5838e1ff77c732cb19cb1728eadfbb5f8e6ba0998b5cb60 Dec 13 02:06:26.706561 env[1236]: time="2024-12-13T02:06:26.706560348Z" level=warning msg="cleaning up after shim disconnected" id=6e7f90706cd9bcd2d5838e1ff77c732cb19cb1728eadfbb5f8e6ba0998b5cb60 namespace=k8s.io Dec 13 02:06:26.706987 env[1236]: time="2024-12-13T02:06:26.706574358Z" level=info msg="cleaning up dead shim" Dec 13 02:06:26.725699 env[1236]: time="2024-12-13T02:06:26.725632961Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:06:26Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5058 runtime=io.containerd.runc.v2\n" Dec 13 02:06:26.728771 env[1236]: time="2024-12-13T02:06:26.728702267Z" level=info msg="StopContainer for \"6e7f90706cd9bcd2d5838e1ff77c732cb19cb1728eadfbb5f8e6ba0998b5cb60\" returns successfully" Dec 13 02:06:26.729768 env[1236]: time="2024-12-13T02:06:26.729711517Z" level=info msg="StopPodSandbox for \"4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155\"" Dec 13 02:06:26.729929 env[1236]: time="2024-12-13T02:06:26.729816804Z" level=info msg="Container to stop \"6e7f90706cd9bcd2d5838e1ff77c732cb19cb1728eadfbb5f8e6ba0998b5cb60\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 02:06:26.741011 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155-shm.mount: Deactivated successfully. Dec 13 02:06:26.745889 systemd[1]: cri-containerd-4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155.scope: Deactivated successfully. Dec 13 02:06:26.759995 kernel: kauditd_printk_skb: 37 callbacks suppressed Dec 13 02:06:26.760372 kernel: audit: type=1334 audit(1734055586.745:1399): prog-id=150 op=UNLOAD Dec 13 02:06:26.745000 audit: BPF prog-id=150 op=UNLOAD Dec 13 02:06:26.758000 audit: BPF prog-id=153 op=UNLOAD Dec 13 02:06:26.770270 kernel: audit: type=1334 audit(1734055586.758:1400): prog-id=153 op=UNLOAD Dec 13 02:06:26.797205 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155-rootfs.mount: Deactivated successfully. Dec 13 02:06:26.800542 env[1236]: time="2024-12-13T02:06:26.800461664Z" level=info msg="shim disconnected" id=4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155 Dec 13 02:06:26.800740 env[1236]: time="2024-12-13T02:06:26.800547251Z" level=warning msg="cleaning up after shim disconnected" id=4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155 namespace=k8s.io Dec 13 02:06:26.800740 env[1236]: time="2024-12-13T02:06:26.800562733Z" level=info msg="cleaning up dead shim" Dec 13 02:06:26.816614 env[1236]: time="2024-12-13T02:06:26.816549226Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:06:26Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5089 runtime=io.containerd.runc.v2\n" Dec 13 02:06:26.920973 systemd-networkd[1030]: cali1a7de5fa6d7: Link DOWN Dec 13 02:06:26.920984 systemd-networkd[1030]: cali1a7de5fa6d7: Lost carrier Dec 13 02:06:26.975000 audit[5134]: NETFILTER_CFG table=filter:121 family=2 entries=42 op=nft_register_rule pid=5134 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:06:26.975000 audit[5134]: SYSCALL arch=c000003e syscall=46 success=yes exit=6704 a0=3 a1=7ffd271c07b0 a2=0 a3=7ffd271c079c items=0 ppid=4324 pid=5134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.027177 kernel: audit: type=1325 audit(1734055586.975:1401): table=filter:121 family=2 entries=42 op=nft_register_rule pid=5134 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:06:27.027384 kernel: audit: type=1300 audit(1734055586.975:1401): arch=c000003e syscall=46 success=yes exit=6704 a0=3 a1=7ffd271c07b0 a2=0 a3=7ffd271c079c items=0 ppid=4324 pid=5134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:26.975000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:06:27.048785 kernel: audit: type=1327 audit(1734055586.975:1401): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:06:26.992000 audit[5134]: NETFILTER_CFG table=filter:122 family=2 entries=4 op=nft_unregister_chain pid=5134 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:06:27.068824 kernel: audit: type=1325 audit(1734055586.992:1402): table=filter:122 family=2 entries=4 op=nft_unregister_chain pid=5134 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:06:26.992000 audit[5134]: SYSCALL arch=c000003e syscall=46 success=yes exit=592 a0=3 a1=7ffd271c07b0 a2=0 a3=556667f58000 items=0 ppid=4324 pid=5134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.106181 kernel: audit: type=1300 audit(1734055586.992:1402): arch=c000003e syscall=46 success=yes exit=592 a0=3 a1=7ffd271c07b0 a2=0 a3=556667f58000 items=0 ppid=4324 pid=5134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:27.106372 kernel: audit: type=1327 audit(1734055586.992:1402): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:06:26.992000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:06:27.131471 env[1236]: 2024-12-13 02:06:26.918 [INFO][5116] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" Dec 13 02:06:27.131471 env[1236]: 2024-12-13 02:06:26.919 [INFO][5116] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" iface="eth0" netns="/var/run/netns/cni-b329e55a-b338-7b48-ee9a-c67a193bd66e" Dec 13 02:06:27.131471 env[1236]: 2024-12-13 02:06:26.919 [INFO][5116] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" iface="eth0" netns="/var/run/netns/cni-b329e55a-b338-7b48-ee9a-c67a193bd66e" Dec 13 02:06:27.131471 env[1236]: 2024-12-13 02:06:26.942 [INFO][5116] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" after=22.917209ms iface="eth0" netns="/var/run/netns/cni-b329e55a-b338-7b48-ee9a-c67a193bd66e" Dec 13 02:06:27.131471 env[1236]: 2024-12-13 02:06:26.942 [INFO][5116] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" Dec 13 02:06:27.131471 env[1236]: 2024-12-13 02:06:26.942 [INFO][5116] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" Dec 13 02:06:27.131471 env[1236]: 2024-12-13 02:06:26.998 [INFO][5127] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" HandleID="k8s-pod-network.4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbc6f5ff--k644c-eth0" Dec 13 02:06:27.131471 env[1236]: 2024-12-13 02:06:26.999 [INFO][5127] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:06:27.131471 env[1236]: 2024-12-13 02:06:26.999 [INFO][5127] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:06:27.131471 env[1236]: 2024-12-13 02:06:27.125 [INFO][5127] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" HandleID="k8s-pod-network.4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbc6f5ff--k644c-eth0" Dec 13 02:06:27.131471 env[1236]: 2024-12-13 02:06:27.126 [INFO][5127] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" HandleID="k8s-pod-network.4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbc6f5ff--k644c-eth0" Dec 13 02:06:27.131471 env[1236]: 2024-12-13 02:06:27.128 [INFO][5127] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:06:27.131471 env[1236]: 2024-12-13 02:06:27.130 [INFO][5116] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" Dec 13 02:06:27.136837 systemd[1]: run-netns-cni\x2db329e55a\x2db338\x2d7b48\x2dee9a\x2dc67a193bd66e.mount: Deactivated successfully. Dec 13 02:06:27.138941 env[1236]: time="2024-12-13T02:06:27.138872871Z" level=info msg="TearDown network for sandbox \"4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155\" successfully" Dec 13 02:06:27.138941 env[1236]: time="2024-12-13T02:06:27.138931622Z" level=info msg="StopPodSandbox for \"4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155\" returns successfully" Dec 13 02:06:27.330813 kubelet[2120]: I1213 02:06:27.330757 2120 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"kube-api-access-kfjm9\" (UniqueName: \"kubernetes.io/projected/ab5406ea-be6d-43ba-ad0a-95a82cc144df-kube-api-access-kfjm9\") pod \"ab5406ea-be6d-43ba-ad0a-95a82cc144df\" (UID: \"ab5406ea-be6d-43ba-ad0a-95a82cc144df\") " Dec 13 02:06:27.331645 kubelet[2120]: I1213 02:06:27.331613 2120 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ab5406ea-be6d-43ba-ad0a-95a82cc144df-tigera-ca-bundle\") pod \"ab5406ea-be6d-43ba-ad0a-95a82cc144df\" (UID: \"ab5406ea-be6d-43ba-ad0a-95a82cc144df\") " Dec 13 02:06:27.343181 kubelet[2120]: I1213 02:06:27.342296 2120 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/ab5406ea-be6d-43ba-ad0a-95a82cc144df-kube-api-access-kfjm9" (OuterVolumeSpecName: "kube-api-access-kfjm9") pod "ab5406ea-be6d-43ba-ad0a-95a82cc144df" (UID: "ab5406ea-be6d-43ba-ad0a-95a82cc144df"). InnerVolumeSpecName "kube-api-access-kfjm9". PluginName "kubernetes.io/projected", VolumeGidValue "" Dec 13 02:06:27.344140 kubelet[2120]: I1213 02:06:27.343575 2120 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/ab5406ea-be6d-43ba-ad0a-95a82cc144df-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "ab5406ea-be6d-43ba-ad0a-95a82cc144df" (UID: "ab5406ea-be6d-43ba-ad0a-95a82cc144df"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Dec 13 02:06:27.344838 systemd[1]: var-lib-kubelet-pods-ab5406ea\x2dbe6d\x2d43ba\x2dad0a\x2d95a82cc144df-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dkfjm9.mount: Deactivated successfully. Dec 13 02:06:27.432597 kubelet[2120]: I1213 02:06:27.432547 2120 reconciler_common.go:289] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ab5406ea-be6d-43ba-ad0a-95a82cc144df-tigera-ca-bundle\") on node \"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 02:06:27.432597 kubelet[2120]: I1213 02:06:27.432595 2120 reconciler_common.go:289] "Volume detached for volume \"kube-api-access-kfjm9\" (UniqueName: \"kubernetes.io/projected/ab5406ea-be6d-43ba-ad0a-95a82cc144df-kube-api-access-kfjm9\") on node \"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 02:06:27.613930 systemd[1]: var-lib-kubelet-pods-ab5406ea\x2dbe6d\x2d43ba\x2dad0a\x2d95a82cc144df-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dkube\x2dcontrollers-1.mount: Deactivated successfully. Dec 13 02:06:27.715746 kubelet[2120]: I1213 02:06:27.715697 2120 scope.go:117] "RemoveContainer" containerID="6e7f90706cd9bcd2d5838e1ff77c732cb19cb1728eadfbb5f8e6ba0998b5cb60" Dec 13 02:06:27.720842 env[1236]: time="2024-12-13T02:06:27.720785741Z" level=info msg="RemoveContainer for \"6e7f90706cd9bcd2d5838e1ff77c732cb19cb1728eadfbb5f8e6ba0998b5cb60\"" Dec 13 02:06:27.735171 env[1236]: time="2024-12-13T02:06:27.735080361Z" level=info msg="RemoveContainer for \"6e7f90706cd9bcd2d5838e1ff77c732cb19cb1728eadfbb5f8e6ba0998b5cb60\" returns successfully" Dec 13 02:06:27.739994 kubelet[2120]: I1213 02:06:27.739944 2120 scope.go:117] "RemoveContainer" containerID="6e7f90706cd9bcd2d5838e1ff77c732cb19cb1728eadfbb5f8e6ba0998b5cb60" Dec 13 02:06:27.740734 env[1236]: time="2024-12-13T02:06:27.740458098Z" level=error msg="ContainerStatus for \"6e7f90706cd9bcd2d5838e1ff77c732cb19cb1728eadfbb5f8e6ba0998b5cb60\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"6e7f90706cd9bcd2d5838e1ff77c732cb19cb1728eadfbb5f8e6ba0998b5cb60\": not found" Dec 13 02:06:27.742868 systemd[1]: Removed slice kubepods-besteffort-podab5406ea_be6d_43ba_ad0a_95a82cc144df.slice. Dec 13 02:06:27.744683 kubelet[2120]: E1213 02:06:27.744634 2120 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"6e7f90706cd9bcd2d5838e1ff77c732cb19cb1728eadfbb5f8e6ba0998b5cb60\": not found" containerID="6e7f90706cd9bcd2d5838e1ff77c732cb19cb1728eadfbb5f8e6ba0998b5cb60" Dec 13 02:06:27.745447 kubelet[2120]: I1213 02:06:27.745402 2120 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"6e7f90706cd9bcd2d5838e1ff77c732cb19cb1728eadfbb5f8e6ba0998b5cb60"} err="failed to get container status \"6e7f90706cd9bcd2d5838e1ff77c732cb19cb1728eadfbb5f8e6ba0998b5cb60\": rpc error: code = NotFound desc = an error occurred when try to find container \"6e7f90706cd9bcd2d5838e1ff77c732cb19cb1728eadfbb5f8e6ba0998b5cb60\": not found" Dec 13 02:06:28.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.6:22-139.178.68.195:58836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:28.764273 kernel: audit: type=1130 audit(1734055588.738:1403): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.6:22-139.178.68.195:58836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:28.738342 systemd[1]: Started sshd@12-10.128.0.6:22-139.178.68.195:58836.service. Dec 13 02:06:29.034000 audit[5159]: USER_ACCT pid=5159 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:29.037150 sshd[5159]: Accepted publickey for core from 139.178.68.195 port 58836 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:06:29.065364 kernel: audit: type=1101 audit(1734055589.034:1404): pid=5159 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:29.066744 sshd[5159]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:06:29.075905 systemd[1]: Started session-13.scope. Dec 13 02:06:29.064000 audit[5159]: CRED_ACQ pid=5159 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:29.065000 audit[5159]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf6b656a0 a2=3 a3=0 items=0 ppid=1 pid=5159 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:29.065000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:29.077223 systemd-logind[1221]: New session 13 of user core. Dec 13 02:06:29.084000 audit[5159]: USER_START pid=5159 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:29.087000 audit[5161]: CRED_ACQ pid=5161 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:29.248095 kubelet[2120]: I1213 02:06:29.248051 2120 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="ab5406ea-be6d-43ba-ad0a-95a82cc144df" path="/var/lib/kubelet/pods/ab5406ea-be6d-43ba-ad0a-95a82cc144df/volumes" Dec 13 02:06:29.343963 sshd[5159]: pam_unix(sshd:session): session closed for user core Dec 13 02:06:29.346000 audit[5159]: USER_END pid=5159 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:29.346000 audit[5159]: CRED_DISP pid=5159 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:29.351217 systemd-logind[1221]: Session 13 logged out. Waiting for processes to exit. Dec 13 02:06:29.351837 systemd[1]: sshd@12-10.128.0.6:22-139.178.68.195:58836.service: Deactivated successfully. Dec 13 02:06:29.353085 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 02:06:29.351000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.6:22-139.178.68.195:58836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:29.355905 systemd-logind[1221]: Removed session 13. Dec 13 02:06:30.776000 audit: BPF prog-id=132 op=UNLOAD Dec 13 02:06:30.777262 systemd[1]: cri-containerd-0497e657404f10e117514b85d2a47789a8beb5e1135c9ac6d8163420d35a79ba.scope: Deactivated successfully. Dec 13 02:06:30.784000 audit: BPF prog-id=135 op=UNLOAD Dec 13 02:06:30.809450 env[1236]: time="2024-12-13T02:06:30.809391991Z" level=info msg="shim disconnected" id=0497e657404f10e117514b85d2a47789a8beb5e1135c9ac6d8163420d35a79ba Dec 13 02:06:30.810281 env[1236]: time="2024-12-13T02:06:30.810245283Z" level=warning msg="cleaning up after shim disconnected" id=0497e657404f10e117514b85d2a47789a8beb5e1135c9ac6d8163420d35a79ba namespace=k8s.io Dec 13 02:06:30.810440 env[1236]: time="2024-12-13T02:06:30.810417557Z" level=info msg="cleaning up dead shim" Dec 13 02:06:30.818675 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0497e657404f10e117514b85d2a47789a8beb5e1135c9ac6d8163420d35a79ba-rootfs.mount: Deactivated successfully. Dec 13 02:06:30.823818 env[1236]: time="2024-12-13T02:06:30.823757809Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:06:30Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5212 runtime=io.containerd.runc.v2\n" Dec 13 02:06:30.837078 env[1236]: time="2024-12-13T02:06:30.837013862Z" level=info msg="StopContainer for \"0497e657404f10e117514b85d2a47789a8beb5e1135c9ac6d8163420d35a79ba\" returns successfully" Dec 13 02:06:30.838028 env[1236]: time="2024-12-13T02:06:30.837986671Z" level=info msg="StopPodSandbox for \"a87e68123b85801f35cca1a9379d96b0de0c0325f8b47890ca58f00001cf4b6d\"" Dec 13 02:06:30.838456 env[1236]: time="2024-12-13T02:06:30.838415149Z" level=info msg="Container to stop \"0497e657404f10e117514b85d2a47789a8beb5e1135c9ac6d8163420d35a79ba\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 02:06:30.843345 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a87e68123b85801f35cca1a9379d96b0de0c0325f8b47890ca58f00001cf4b6d-shm.mount: Deactivated successfully. Dec 13 02:06:30.855061 systemd[1]: cri-containerd-a87e68123b85801f35cca1a9379d96b0de0c0325f8b47890ca58f00001cf4b6d.scope: Deactivated successfully. Dec 13 02:06:30.854000 audit: BPF prog-id=125 op=UNLOAD Dec 13 02:06:30.860000 audit: BPF prog-id=128 op=UNLOAD Dec 13 02:06:30.886914 env[1236]: time="2024-12-13T02:06:30.886847678Z" level=info msg="shim disconnected" id=a87e68123b85801f35cca1a9379d96b0de0c0325f8b47890ca58f00001cf4b6d Dec 13 02:06:30.890509 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a87e68123b85801f35cca1a9379d96b0de0c0325f8b47890ca58f00001cf4b6d-rootfs.mount: Deactivated successfully. Dec 13 02:06:30.893185 env[1236]: time="2024-12-13T02:06:30.893127719Z" level=warning msg="cleaning up after shim disconnected" id=a87e68123b85801f35cca1a9379d96b0de0c0325f8b47890ca58f00001cf4b6d namespace=k8s.io Dec 13 02:06:30.893390 env[1236]: time="2024-12-13T02:06:30.893363205Z" level=info msg="cleaning up dead shim" Dec 13 02:06:30.906480 env[1236]: time="2024-12-13T02:06:30.906423798Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:06:30Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5244 runtime=io.containerd.runc.v2\n" Dec 13 02:06:30.912730 env[1236]: time="2024-12-13T02:06:30.912608826Z" level=info msg="TearDown network for sandbox \"a87e68123b85801f35cca1a9379d96b0de0c0325f8b47890ca58f00001cf4b6d\" successfully" Dec 13 02:06:30.912730 env[1236]: time="2024-12-13T02:06:30.912679851Z" level=info msg="StopPodSandbox for \"a87e68123b85801f35cca1a9379d96b0de0c0325f8b47890ca58f00001cf4b6d\" returns successfully" Dec 13 02:06:30.951000 audit[5259]: NETFILTER_CFG table=filter:123 family=2 entries=9 op=nft_register_rule pid=5259 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:30.951000 audit[5259]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd914423f0 a2=0 a3=7ffd914423dc items=0 ppid=2267 pid=5259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:30.951000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:30.958000 audit[5259]: NETFILTER_CFG table=nat:124 family=2 entries=27 op=nft_unregister_chain pid=5259 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:30.958000 audit[5259]: SYSCALL arch=c000003e syscall=46 success=yes exit=6028 a0=3 a1=7ffd914423f0 a2=0 a3=7ffd914423dc items=0 ppid=2267 pid=5259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:30.958000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:31.079274 kubelet[2120]: I1213 02:06:31.079205 2120 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f37c9b0d-5d66-44af-8053-eea90e783c17-tigera-ca-bundle\") pod \"f37c9b0d-5d66-44af-8053-eea90e783c17\" (UID: \"f37c9b0d-5d66-44af-8053-eea90e783c17\") " Dec 13 02:06:31.079274 kubelet[2120]: I1213 02:06:31.079269 2120 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/f37c9b0d-5d66-44af-8053-eea90e783c17-typha-certs\") pod \"f37c9b0d-5d66-44af-8053-eea90e783c17\" (UID: \"f37c9b0d-5d66-44af-8053-eea90e783c17\") " Dec 13 02:06:31.080220 kubelet[2120]: I1213 02:06:31.079302 2120 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"kube-api-access-jfqd9\" (UniqueName: \"kubernetes.io/projected/f37c9b0d-5d66-44af-8053-eea90e783c17-kube-api-access-jfqd9\") pod \"f37c9b0d-5d66-44af-8053-eea90e783c17\" (UID: \"f37c9b0d-5d66-44af-8053-eea90e783c17\") " Dec 13 02:06:31.097673 systemd[1]: var-lib-kubelet-pods-f37c9b0d\x2d5d66\x2d44af\x2d8053\x2deea90e783c17-volumes-kubernetes.io\x7esecret-typha\x2dcerts.mount: Deactivated successfully. Dec 13 02:06:31.097887 systemd[1]: var-lib-kubelet-pods-f37c9b0d\x2d5d66\x2d44af\x2d8053\x2deea90e783c17-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2djfqd9.mount: Deactivated successfully. Dec 13 02:06:31.106336 kubelet[2120]: I1213 02:06:31.106269 2120 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/f37c9b0d-5d66-44af-8053-eea90e783c17-kube-api-access-jfqd9" (OuterVolumeSpecName: "kube-api-access-jfqd9") pod "f37c9b0d-5d66-44af-8053-eea90e783c17" (UID: "f37c9b0d-5d66-44af-8053-eea90e783c17"). InnerVolumeSpecName "kube-api-access-jfqd9". PluginName "kubernetes.io/projected", VolumeGidValue "" Dec 13 02:06:31.106603 kubelet[2120]: I1213 02:06:31.106427 2120 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/f37c9b0d-5d66-44af-8053-eea90e783c17-typha-certs" (OuterVolumeSpecName: "typha-certs") pod "f37c9b0d-5d66-44af-8053-eea90e783c17" (UID: "f37c9b0d-5d66-44af-8053-eea90e783c17"). InnerVolumeSpecName "typha-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Dec 13 02:06:31.109213 kubelet[2120]: I1213 02:06:31.107156 2120 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/f37c9b0d-5d66-44af-8053-eea90e783c17-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "f37c9b0d-5d66-44af-8053-eea90e783c17" (UID: "f37c9b0d-5d66-44af-8053-eea90e783c17"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Dec 13 02:06:31.112722 systemd[1]: var-lib-kubelet-pods-f37c9b0d\x2d5d66\x2d44af\x2d8053\x2deea90e783c17-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dtypha-1.mount: Deactivated successfully. Dec 13 02:06:31.180419 kubelet[2120]: I1213 02:06:31.180358 2120 reconciler_common.go:289] "Volume detached for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/f37c9b0d-5d66-44af-8053-eea90e783c17-typha-certs\") on node \"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 02:06:31.180419 kubelet[2120]: I1213 02:06:31.180408 2120 reconciler_common.go:289] "Volume detached for volume \"kube-api-access-jfqd9\" (UniqueName: \"kubernetes.io/projected/f37c9b0d-5d66-44af-8053-eea90e783c17-kube-api-access-jfqd9\") on node \"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 02:06:31.180419 kubelet[2120]: I1213 02:06:31.180428 2120 reconciler_common.go:289] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f37c9b0d-5d66-44af-8053-eea90e783c17-tigera-ca-bundle\") on node \"ci-3510-3-6-1953990c6081bf67a15e.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 02:06:31.252153 systemd[1]: Removed slice kubepods-besteffort-podf37c9b0d_5d66_44af_8053_eea90e783c17.slice. Dec 13 02:06:31.731092 kubelet[2120]: I1213 02:06:31.731053 2120 scope.go:117] "RemoveContainer" containerID="0497e657404f10e117514b85d2a47789a8beb5e1135c9ac6d8163420d35a79ba" Dec 13 02:06:31.734580 env[1236]: time="2024-12-13T02:06:31.734184376Z" level=info msg="RemoveContainer for \"0497e657404f10e117514b85d2a47789a8beb5e1135c9ac6d8163420d35a79ba\"" Dec 13 02:06:31.739501 env[1236]: time="2024-12-13T02:06:31.739424525Z" level=info msg="RemoveContainer for \"0497e657404f10e117514b85d2a47789a8beb5e1135c9ac6d8163420d35a79ba\" returns successfully" Dec 13 02:06:31.739726 kubelet[2120]: I1213 02:06:31.739693 2120 scope.go:117] "RemoveContainer" containerID="0497e657404f10e117514b85d2a47789a8beb5e1135c9ac6d8163420d35a79ba" Dec 13 02:06:31.741295 env[1236]: time="2024-12-13T02:06:31.740272797Z" level=error msg="ContainerStatus for \"0497e657404f10e117514b85d2a47789a8beb5e1135c9ac6d8163420d35a79ba\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"0497e657404f10e117514b85d2a47789a8beb5e1135c9ac6d8163420d35a79ba\": not found" Dec 13 02:06:31.741454 kubelet[2120]: E1213 02:06:31.740522 2120 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"0497e657404f10e117514b85d2a47789a8beb5e1135c9ac6d8163420d35a79ba\": not found" containerID="0497e657404f10e117514b85d2a47789a8beb5e1135c9ac6d8163420d35a79ba" Dec 13 02:06:31.741454 kubelet[2120]: I1213 02:06:31.740573 2120 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"0497e657404f10e117514b85d2a47789a8beb5e1135c9ac6d8163420d35a79ba"} err="failed to get container status \"0497e657404f10e117514b85d2a47789a8beb5e1135c9ac6d8163420d35a79ba\": rpc error: code = NotFound desc = an error occurred when try to find container \"0497e657404f10e117514b85d2a47789a8beb5e1135c9ac6d8163420d35a79ba\": not found" Dec 13 02:06:33.247021 kubelet[2120]: I1213 02:06:33.246952 2120 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="f37c9b0d-5d66-44af-8053-eea90e783c17" path="/var/lib/kubelet/pods/f37c9b0d-5d66-44af-8053-eea90e783c17/volumes" Dec 13 02:06:34.103000 audit[5330]: NETFILTER_CFG table=filter:125 family=2 entries=9 op=nft_register_rule pid=5330 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:34.109888 kernel: kauditd_printk_skb: 19 callbacks suppressed Dec 13 02:06:34.110058 kernel: audit: type=1325 audit(1734055594.103:1418): table=filter:125 family=2 entries=9 op=nft_register_rule pid=5330 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:34.129154 kernel: audit: type=1300 audit(1734055594.103:1418): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffcea016730 a2=0 a3=7ffcea01671c items=0 ppid=2267 pid=5330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:34.103000 audit[5330]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffcea016730 a2=0 a3=7ffcea01671c items=0 ppid=2267 pid=5330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:34.161810 kernel: audit: type=1327 audit(1734055594.103:1418): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:34.103000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:34.175188 kernel: audit: type=1325 audit(1734055594.158:1419): table=nat:126 family=2 entries=27 op=nft_register_chain pid=5330 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:34.158000 audit[5330]: NETFILTER_CFG table=nat:126 family=2 entries=27 op=nft_register_chain pid=5330 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:34.158000 audit[5330]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffcea016730 a2=0 a3=7ffcea01671c items=0 ppid=2267 pid=5330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:34.224516 kernel: audit: type=1300 audit(1734055594.158:1419): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffcea016730 a2=0 a3=7ffcea01671c items=0 ppid=2267 pid=5330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:34.224729 kernel: audit: type=1327 audit(1734055594.158:1419): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:34.158000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:34.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.6:22-139.178.68.195:58850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:34.390742 systemd[1]: Started sshd@13-10.128.0.6:22-139.178.68.195:58850.service. Dec 13 02:06:34.416224 kernel: audit: type=1130 audit(1734055594.390:1420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.6:22-139.178.68.195:58850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:34.561000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.584232 kernel: audit: type=1400 audit(1734055594.561:1421): avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.561000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.607241 kernel: audit: type=1400 audit(1734055594.561:1421): avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.561000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.645237 kernel: audit: type=1400 audit(1734055594.561:1421): avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.561000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.561000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.561000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.561000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.561000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.561000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.561000 audit: BPF prog-id=211 op=LOAD Dec 13 02:06:34.561000 audit[5349]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd4d6b07a0 a2=98 a3=3 items=0 ppid=5334 pid=5349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:34.561000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:34.582000 audit: BPF prog-id=211 op=UNLOAD Dec 13 02:06:34.582000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.582000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.582000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.582000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.582000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.582000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.582000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.582000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.582000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.582000 audit: BPF prog-id=212 op=LOAD Dec 13 02:06:34.582000 audit[5349]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd4d6b0580 a2=74 a3=540051 items=0 ppid=5334 pid=5349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:34.582000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:34.583000 audit: BPF prog-id=212 op=UNLOAD Dec 13 02:06:34.583000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.583000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.583000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.583000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.583000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.583000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.583000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.583000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.583000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.583000 audit: BPF prog-id=213 op=LOAD Dec 13 02:06:34.583000 audit[5349]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd4d6b05b0 a2=94 a3=2 items=0 ppid=5334 pid=5349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:34.583000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:34.583000 audit: BPF prog-id=213 op=UNLOAD Dec 13 02:06:34.747000 audit[5332]: USER_ACCT pid=5332 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:34.750521 sshd[5332]: Accepted publickey for core from 139.178.68.195 port 58850 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:06:34.750000 audit[5332]: CRED_ACQ pid=5332 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:34.750000 audit[5332]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeeca2fcc0 a2=3 a3=0 items=0 ppid=1 pid=5332 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:34.750000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:34.752569 sshd[5332]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:06:34.762813 systemd-logind[1221]: New session 14 of user core. Dec 13 02:06:34.765335 systemd[1]: Started session-14.scope. Dec 13 02:06:34.775000 audit[5332]: USER_START pid=5332 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:34.778000 audit[5362]: CRED_ACQ pid=5362 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:34.896000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.896000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.896000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.896000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.896000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.896000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.896000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.896000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.896000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.896000 audit: BPF prog-id=214 op=LOAD Dec 13 02:06:34.896000 audit[5349]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd4d6b0470 a2=40 a3=1 items=0 ppid=5334 pid=5349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:34.896000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:34.896000 audit: BPF prog-id=214 op=UNLOAD Dec 13 02:06:34.896000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.896000 audit[5349]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd4d6b0540 a2=50 a3=7ffd4d6b0620 items=0 ppid=5334 pid=5349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:34.896000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:34.912000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.912000 audit[5349]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd4d6b0480 a2=28 a3=0 items=0 ppid=5334 pid=5349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:34.912000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:34.912000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.912000 audit[5349]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd4d6b04b0 a2=28 a3=0 items=0 ppid=5334 pid=5349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:34.912000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:34.912000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.912000 audit[5349]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd4d6b03c0 a2=28 a3=0 items=0 ppid=5334 pid=5349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:34.912000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:34.912000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.912000 audit[5349]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd4d6b04d0 a2=28 a3=0 items=0 ppid=5334 pid=5349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:34.912000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:34.912000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.912000 audit[5349]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd4d6b04b0 a2=28 a3=0 items=0 ppid=5334 pid=5349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:34.912000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:34.912000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.912000 audit[5349]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd4d6b04a0 a2=28 a3=0 items=0 ppid=5334 pid=5349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:34.912000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:34.912000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.912000 audit[5349]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd4d6b04d0 a2=28 a3=0 items=0 ppid=5334 pid=5349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:34.912000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:34.912000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.912000 audit[5349]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd4d6b04b0 a2=28 a3=0 items=0 ppid=5334 pid=5349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:34.912000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:34.912000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.912000 audit[5349]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd4d6b04d0 a2=28 a3=0 items=0 ppid=5334 pid=5349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:34.912000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:34.912000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.912000 audit[5349]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd4d6b04a0 a2=28 a3=0 items=0 ppid=5334 pid=5349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:34.912000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:34.912000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.912000 audit[5349]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd4d6b0510 a2=28 a3=0 items=0 ppid=5334 pid=5349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:34.912000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:34.912000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.912000 audit[5349]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd4d6b02c0 a2=50 a3=1 items=0 ppid=5334 pid=5349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:34.912000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:34.912000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.912000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.912000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.912000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.912000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.912000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.912000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.912000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.912000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.912000 audit: BPF prog-id=215 op=LOAD Dec 13 02:06:34.912000 audit[5349]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd4d6b02c0 a2=94 a3=5 items=0 ppid=5334 pid=5349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:34.912000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:34.912000 audit: BPF prog-id=215 op=UNLOAD Dec 13 02:06:34.912000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.912000 audit[5349]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd4d6b0370 a2=50 a3=1 items=0 ppid=5334 pid=5349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:34.912000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:34.912000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.912000 audit[5349]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd4d6b0490 a2=4 a3=38 items=0 ppid=5334 pid=5349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:34.912000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:34.912000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.912000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.912000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.912000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.912000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.912000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.912000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.912000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.912000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.912000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.912000 audit[5349]: AVC avc: denied { confidentiality } for pid=5349 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:06:34.912000 audit[5349]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd4d6b04e0 a2=94 a3=6 items=0 ppid=5334 pid=5349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:34.912000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:34.913000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.913000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.913000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.913000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.913000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.913000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.913000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.913000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.913000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.913000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.913000 audit[5349]: AVC avc: denied { confidentiality } for pid=5349 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:06:34.913000 audit[5349]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd4d6afc90 a2=94 a3=83 items=0 ppid=5334 pid=5349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:34.913000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:34.913000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.913000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.913000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.913000 audit[5349]: AVC avc: denied { bpf } for pid=5349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.913000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.913000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.913000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.913000 audit[5349]: AVC avc: denied { perfmon } for pid=5349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.913000 audit[5349]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd4d6afc90 a2=94 a3=83 items=0 ppid=5334 pid=5349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:34.913000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:06:34.920000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.920000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.920000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.920000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.920000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.920000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.920000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.920000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.920000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.920000 audit: BPF prog-id=216 op=LOAD Dec 13 02:06:34.920000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffeabdaaa0 a2=98 a3=3 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:34.920000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:34.920000 audit: BPF prog-id=216 op=UNLOAD Dec 13 02:06:34.926000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.926000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.926000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.926000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.926000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.926000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.926000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.926000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.926000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.926000 audit: BPF prog-id=217 op=LOAD Dec 13 02:06:34.926000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffeabda880 a2=74 a3=540051 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:34.926000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:34.926000 audit: BPF prog-id=217 op=UNLOAD Dec 13 02:06:34.926000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.926000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.926000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.926000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.926000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.926000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.926000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.926000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.926000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:34.926000 audit: BPF prog-id=218 op=LOAD Dec 13 02:06:34.926000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffeabda8b0 a2=94 a3=2 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:34.926000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:34.926000 audit: BPF prog-id=218 op=UNLOAD Dec 13 02:06:35.110003 sshd[5332]: pam_unix(sshd:session): session closed for user core Dec 13 02:06:35.110000 audit[5332]: USER_END pid=5332 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:35.111000 audit[5332]: CRED_DISP pid=5332 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:35.113000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.6:22-139.178.68.195:58850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:35.114220 systemd[1]: sshd@13-10.128.0.6:22-139.178.68.195:58850.service: Deactivated successfully. Dec 13 02:06:35.115464 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 02:06:35.116840 systemd-logind[1221]: Session 14 logged out. Waiting for processes to exit. Dec 13 02:06:35.118771 systemd-logind[1221]: Removed session 14. Dec 13 02:06:35.154000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.154000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.154000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.154000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.154000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.154000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.154000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.154000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.154000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.154000 audit: BPF prog-id=219 op=LOAD Dec 13 02:06:35.154000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffeabda770 a2=40 a3=1 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.154000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.155000 audit: BPF prog-id=219 op=UNLOAD Dec 13 02:06:35.155000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.155000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffeabda840 a2=50 a3=7fffeabda920 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.155000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.171000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.171000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffeabda780 a2=28 a3=0 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.171000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.171000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.171000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffeabda7b0 a2=28 a3=0 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.171000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.171000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.171000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffeabda6c0 a2=28 a3=0 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.171000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.171000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.171000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffeabda7d0 a2=28 a3=0 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.171000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.172000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.172000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffeabda7b0 a2=28 a3=0 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.172000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.172000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.172000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffeabda7a0 a2=28 a3=0 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.172000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.172000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.172000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffeabda7d0 a2=28 a3=0 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.172000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.172000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.172000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffeabda7b0 a2=28 a3=0 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.172000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.172000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.172000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffeabda7d0 a2=28 a3=0 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.172000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.173000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.173000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffeabda7a0 a2=28 a3=0 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.173000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.173000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.173000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffeabda810 a2=28 a3=0 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.173000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.173000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.173000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffeabda5c0 a2=50 a3=1 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.173000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.173000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.173000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.173000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.173000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.173000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.173000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.173000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.173000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.173000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.173000 audit: BPF prog-id=220 op=LOAD Dec 13 02:06:35.173000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffeabda5c0 a2=94 a3=5 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.173000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.174000 audit: BPF prog-id=220 op=UNLOAD Dec 13 02:06:35.174000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.174000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffeabda670 a2=50 a3=1 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.174000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.175000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.175000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fffeabda790 a2=4 a3=38 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.175000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.175000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.175000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.175000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.175000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.175000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.175000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.175000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.175000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.175000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.175000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.175000 audit[5374]: AVC avc: denied { confidentiality } for pid=5374 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:06:35.175000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffeabda7e0 a2=94 a3=6 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.175000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.176000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.176000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.176000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.176000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.176000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.176000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.176000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.176000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.176000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.176000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.176000 audit[5374]: AVC avc: denied { confidentiality } for pid=5374 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:06:35.176000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffeabd9f90 a2=94 a3=83 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.176000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.177000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.177000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.177000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.177000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.177000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.177000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.177000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.177000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.177000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.177000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.177000 audit[5374]: AVC avc: denied { confidentiality } for pid=5374 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:06:35.177000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffeabd9f90 a2=94 a3=83 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.177000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.179000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.179000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=0 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.179000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.179000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.179000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=40 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.179000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.180000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.180000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=44 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.180000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.180000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.180000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=48 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.180000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.180000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.180000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=4c items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.180000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.181000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.181000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=50 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.181000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.181000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.181000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=54 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.181000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.181000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.181000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=55 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.181000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.182000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.182000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=56 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.182000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.182000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.182000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=57 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.182000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.182000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.182000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=58 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.182000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.183000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.183000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=59 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.183000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.183000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.183000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=5a items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.183000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.183000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.183000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=5b items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.183000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.183000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.183000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=5c items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.183000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.183000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.183000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=5d items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.183000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.183000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.183000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=5e items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.183000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.183000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.183000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=5f items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.183000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.183000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.183000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=60 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.183000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.183000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.183000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=61 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.183000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.185000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.185000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=62 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.185000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.185000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.185000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=63 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.185000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.185000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.185000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=64 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.185000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.185000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.185000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=65 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.185000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.185000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.185000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=66 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.185000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.185000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.185000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=67 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.185000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.185000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.185000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=68 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.185000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.185000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.185000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=69 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.185000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.185000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.185000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=6a items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.185000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.185000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.185000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=6d items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.185000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.185000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.185000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=70 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.185000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.185000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.185000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=71 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.185000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.186000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.186000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=74 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.186000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.186000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.186000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=75 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.186000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.186000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.186000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=78 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.186000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.186000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.186000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=79 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.186000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.190000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.190000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=7c items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.190000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.190000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.190000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=8d items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.190000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.191000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.191000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=8e items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.191000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.192000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.192000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=91 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.192000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.193000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.193000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=92 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.193000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.193000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.193000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=95 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.193000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.194000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.194000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=9a items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.194000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.194000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.194000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=9d items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.194000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.195000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.195000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=9e items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.195000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.195000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.195000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=9f items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.195000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.196000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.196000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=a2 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.196000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.196000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.196000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=a5 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.196000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.197000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.197000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=a6 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.197000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.197000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.197000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=a9 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.197000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.198000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.198000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=ac items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.198000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.198000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.198000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=ad items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.198000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.198000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.198000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=b0 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.198000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.198000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.198000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=c8 items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.198000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.199000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.199000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=cb items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.199000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.199000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.199000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=ce items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.199000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.200000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.200000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffeabdb9d0 a2=10 a3=cf items=0 ppid=5334 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.200000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:06:35.213000 audit[5378]: AVC avc: denied { bpf } for pid=5378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.213000 audit[5378]: AVC avc: denied { bpf } for pid=5378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.213000 audit[5378]: AVC avc: denied { perfmon } for pid=5378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.213000 audit[5378]: AVC avc: denied { perfmon } for pid=5378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.213000 audit[5378]: AVC avc: denied { perfmon } for pid=5378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.213000 audit[5378]: AVC avc: denied { perfmon } for pid=5378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.213000 audit[5378]: AVC avc: denied { perfmon } for pid=5378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.213000 audit[5378]: AVC avc: denied { bpf } for pid=5378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.213000 audit[5378]: AVC avc: denied { bpf } for pid=5378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.213000 audit: BPF prog-id=221 op=LOAD Dec 13 02:06:35.213000 audit[5378]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffedf41caf0 a2=98 a3=1999999999999999 items=0 ppid=5334 pid=5378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.213000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:06:35.216000 audit: BPF prog-id=221 op=UNLOAD Dec 13 02:06:35.216000 audit[5378]: AVC avc: denied { bpf } for pid=5378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.216000 audit[5378]: AVC avc: denied { bpf } for pid=5378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.216000 audit[5378]: AVC avc: denied { perfmon } for pid=5378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.216000 audit[5378]: AVC avc: denied { perfmon } for pid=5378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.216000 audit[5378]: AVC avc: denied { perfmon } for pid=5378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.216000 audit[5378]: AVC avc: denied { perfmon } for pid=5378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.216000 audit[5378]: AVC avc: denied { perfmon } for pid=5378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.216000 audit[5378]: AVC avc: denied { bpf } for pid=5378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.216000 audit[5378]: AVC avc: denied { bpf } for pid=5378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.216000 audit: BPF prog-id=222 op=LOAD Dec 13 02:06:35.216000 audit[5378]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffedf41c9d0 a2=74 a3=ffff items=0 ppid=5334 pid=5378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.216000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:06:35.216000 audit: BPF prog-id=222 op=UNLOAD Dec 13 02:06:35.216000 audit[5378]: AVC avc: denied { bpf } for pid=5378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.216000 audit[5378]: AVC avc: denied { bpf } for pid=5378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.216000 audit[5378]: AVC avc: denied { perfmon } for pid=5378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.216000 audit[5378]: AVC avc: denied { perfmon } for pid=5378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.216000 audit[5378]: AVC avc: denied { perfmon } for pid=5378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.216000 audit[5378]: AVC avc: denied { perfmon } for pid=5378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.216000 audit[5378]: AVC avc: denied { perfmon } for pid=5378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.216000 audit[5378]: AVC avc: denied { bpf } for pid=5378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.216000 audit[5378]: AVC avc: denied { bpf } for pid=5378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:35.216000 audit: BPF prog-id=223 op=LOAD Dec 13 02:06:35.216000 audit[5378]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffedf41ca10 a2=40 a3=7ffedf41cbf0 items=0 ppid=5334 pid=5378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.216000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:06:35.216000 audit: BPF prog-id=223 op=UNLOAD Dec 13 02:06:40.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.6:22-139.178.68.195:55808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:40.157727 systemd[1]: Started sshd@14-10.128.0.6:22-139.178.68.195:55808.service. Dec 13 02:06:40.164313 kernel: kauditd_printk_skb: 521 callbacks suppressed Dec 13 02:06:40.164463 kernel: audit: type=1130 audit(1734055600.158:1548): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.6:22-139.178.68.195:55808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:40.458000 audit[5468]: USER_ACCT pid=5468 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:40.462308 sshd[5468]: Accepted publickey for core from 139.178.68.195 port 55808 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:06:40.488000 audit[5468]: CRED_ACQ pid=5468 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:40.489990 sshd[5468]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:06:40.499331 systemd[1]: Started session-15.scope. Dec 13 02:06:40.500816 systemd-logind[1221]: New session 15 of user core. Dec 13 02:06:40.514818 kernel: audit: type=1101 audit(1734055600.458:1549): pid=5468 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:40.514941 kernel: audit: type=1103 audit(1734055600.488:1550): pid=5468 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:40.514981 kernel: audit: type=1006 audit(1734055600.488:1551): pid=5468 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Dec 13 02:06:40.488000 audit[5468]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff6bc7000 a2=3 a3=0 items=0 ppid=1 pid=5468 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:40.560090 kernel: audit: type=1300 audit(1734055600.488:1551): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff6bc7000 a2=3 a3=0 items=0 ppid=1 pid=5468 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:40.560261 kernel: audit: type=1327 audit(1734055600.488:1551): proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:40.488000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:40.508000 audit[5468]: USER_START pid=5468 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:40.604618 kernel: audit: type=1105 audit(1734055600.508:1552): pid=5468 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:40.514000 audit[5470]: CRED_ACQ pid=5470 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:40.629085 kernel: audit: type=1103 audit(1734055600.514:1553): pid=5470 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:40.837418 sshd[5468]: pam_unix(sshd:session): session closed for user core Dec 13 02:06:40.839000 audit[5468]: USER_END pid=5468 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:40.873168 kernel: audit: type=1106 audit(1734055600.839:1554): pid=5468 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:40.874780 systemd[1]: sshd@14-10.128.0.6:22-139.178.68.195:55808.service: Deactivated successfully. Dec 13 02:06:40.875855 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 02:06:40.876266 systemd-logind[1221]: Session 15 logged out. Waiting for processes to exit. Dec 13 02:06:40.878779 systemd-logind[1221]: Removed session 15. Dec 13 02:06:40.855000 audit[5468]: CRED_DISP pid=5468 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:40.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.6:22-139.178.68.195:55808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:40.913314 kernel: audit: type=1104 audit(1734055600.855:1555): pid=5468 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:45.884209 systemd[1]: Started sshd@15-10.128.0.6:22-139.178.68.195:55818.service. Dec 13 02:06:45.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.6:22-139.178.68.195:55818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:45.890597 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 02:06:45.890711 kernel: audit: type=1130 audit(1734055605.884:1557): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.6:22-139.178.68.195:55818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:46.184000 audit[5579]: USER_ACCT pid=5579 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:46.186346 sshd[5579]: Accepted publickey for core from 139.178.68.195 port 55818 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:06:46.216329 kernel: audit: type=1101 audit(1734055606.184:1558): pid=5579 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:46.216503 kernel: audit: type=1103 audit(1734055606.215:1559): pid=5579 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:46.215000 audit[5579]: CRED_ACQ pid=5579 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:46.217503 sshd[5579]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:06:46.238026 systemd[1]: Started session-16.scope. Dec 13 02:06:46.239480 systemd-logind[1221]: New session 16 of user core. Dec 13 02:06:46.262150 kernel: audit: type=1006 audit(1734055606.215:1560): pid=5579 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Dec 13 02:06:46.262299 kernel: audit: type=1300 audit(1734055606.215:1560): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde3681150 a2=3 a3=0 items=0 ppid=1 pid=5579 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:46.215000 audit[5579]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde3681150 a2=3 a3=0 items=0 ppid=1 pid=5579 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:46.288553 kernel: audit: type=1327 audit(1734055606.215:1560): proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:46.215000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:46.246000 audit[5579]: USER_START pid=5579 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:46.329573 kernel: audit: type=1105 audit(1734055606.246:1561): pid=5579 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:46.329731 kernel: audit: type=1103 audit(1734055606.251:1562): pid=5581 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:46.251000 audit[5581]: CRED_ACQ pid=5581 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:46.520010 sshd[5579]: pam_unix(sshd:session): session closed for user core Dec 13 02:06:46.521000 audit[5579]: USER_END pid=5579 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:46.526015 systemd-logind[1221]: Session 16 logged out. Waiting for processes to exit. Dec 13 02:06:46.528637 systemd[1]: sshd@15-10.128.0.6:22-139.178.68.195:55818.service: Deactivated successfully. Dec 13 02:06:46.529835 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 02:06:46.531917 systemd-logind[1221]: Removed session 16. Dec 13 02:06:46.556312 kernel: audit: type=1106 audit(1734055606.521:1563): pid=5579 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:46.556589 kernel: audit: type=1104 audit(1734055606.521:1564): pid=5579 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:46.521000 audit[5579]: CRED_DISP pid=5579 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:46.568280 systemd[1]: Started sshd@16-10.128.0.6:22-139.178.68.195:49318.service. Dec 13 02:06:46.527000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.6:22-139.178.68.195:55818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:46.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.6:22-139.178.68.195:49318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:46.880879 sshd[5591]: Accepted publickey for core from 139.178.68.195 port 49318 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:06:46.879000 audit[5591]: USER_ACCT pid=5591 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:46.881000 audit[5591]: CRED_ACQ pid=5591 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:46.881000 audit[5591]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff68157810 a2=3 a3=0 items=0 ppid=1 pid=5591 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:46.881000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:46.883711 sshd[5591]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:06:46.891750 systemd-logind[1221]: New session 17 of user core. Dec 13 02:06:46.892543 systemd[1]: Started session-17.scope. Dec 13 02:06:46.900000 audit[5591]: USER_START pid=5591 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:46.903000 audit[5612]: CRED_ACQ pid=5612 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:47.256612 sshd[5591]: pam_unix(sshd:session): session closed for user core Dec 13 02:06:47.258000 audit[5591]: USER_END pid=5591 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:47.258000 audit[5591]: CRED_DISP pid=5591 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:47.262415 systemd-logind[1221]: Session 17 logged out. Waiting for processes to exit. Dec 13 02:06:47.262882 systemd[1]: sshd@16-10.128.0.6:22-139.178.68.195:49318.service: Deactivated successfully. Dec 13 02:06:47.262000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.6:22-139.178.68.195:49318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:47.264264 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 02:06:47.265489 systemd-logind[1221]: Removed session 17. Dec 13 02:06:47.304547 systemd[1]: Started sshd@17-10.128.0.6:22-139.178.68.195:49330.service. Dec 13 02:06:47.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.6:22-139.178.68.195:49330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:47.596000 audit[5621]: USER_ACCT pid=5621 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:47.597445 sshd[5621]: Accepted publickey for core from 139.178.68.195 port 49330 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:06:47.597000 audit[5621]: CRED_ACQ pid=5621 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:47.599672 sshd[5621]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:06:47.598000 audit[5621]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc99d1f810 a2=3 a3=0 items=0 ppid=1 pid=5621 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:47.598000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:47.606188 systemd-logind[1221]: New session 18 of user core. Dec 13 02:06:47.607090 systemd[1]: Started session-18.scope. Dec 13 02:06:47.614000 audit[5621]: USER_START pid=5621 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:47.616000 audit[5623]: CRED_ACQ pid=5623 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:48.656849 systemd[1]: run-containerd-runc-k8s.io-6ed3452c5b5a4793680bd922c9e9bebb39e3172741e5bd0529ab4c55940322f9-runc.cQ824r.mount: Deactivated successfully. Dec 13 02:06:50.249000 audit[5690]: NETFILTER_CFG table=filter:127 family=2 entries=20 op=nft_register_rule pid=5690 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:50.249000 audit[5690]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffc46628150 a2=0 a3=7ffc4662813c items=0 ppid=2267 pid=5690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:50.249000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:50.261296 sshd[5621]: pam_unix(sshd:session): session closed for user core Dec 13 02:06:50.262000 audit[5621]: USER_END pid=5621 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:50.263000 audit[5621]: CRED_DISP pid=5621 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:50.267701 systemd-logind[1221]: Session 18 logged out. Waiting for processes to exit. Dec 13 02:06:50.270000 audit[5690]: NETFILTER_CFG table=nat:128 family=2 entries=22 op=nft_register_rule pid=5690 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:50.270000 audit[5690]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc46628150 a2=0 a3=0 items=0 ppid=2267 pid=5690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:50.270000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:50.272000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.6:22-139.178.68.195:49330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:50.273002 systemd[1]: sshd@17-10.128.0.6:22-139.178.68.195:49330.service: Deactivated successfully. Dec 13 02:06:50.274391 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 02:06:50.280332 systemd-logind[1221]: Removed session 18. Dec 13 02:06:50.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.6:22-139.178.68.195:49336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:50.315046 systemd[1]: Started sshd@18-10.128.0.6:22-139.178.68.195:49336.service. Dec 13 02:06:50.340000 audit[5700]: NETFILTER_CFG table=filter:129 family=2 entries=32 op=nft_register_rule pid=5700 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:50.340000 audit[5700]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffea3d720d0 a2=0 a3=7ffea3d720bc items=0 ppid=2267 pid=5700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:50.340000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:50.350000 audit[5700]: NETFILTER_CFG table=nat:130 family=2 entries=22 op=nft_register_rule pid=5700 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:50.350000 audit[5700]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffea3d720d0 a2=0 a3=0 items=0 ppid=2267 pid=5700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:50.350000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:50.622000 audit[5699]: USER_ACCT pid=5699 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:50.624001 sshd[5699]: Accepted publickey for core from 139.178.68.195 port 49336 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:06:50.624000 audit[5699]: CRED_ACQ pid=5699 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:50.624000 audit[5699]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd855c4fe0 a2=3 a3=0 items=0 ppid=1 pid=5699 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:50.624000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:50.626216 sshd[5699]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:06:50.633531 systemd-logind[1221]: New session 19 of user core. Dec 13 02:06:50.634340 systemd[1]: Started session-19.scope. Dec 13 02:06:50.642000 audit[5699]: USER_START pid=5699 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:50.645000 audit[5716]: CRED_ACQ pid=5716 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:51.069000 audit[5699]: USER_END pid=5699 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:51.069316 sshd[5699]: pam_unix(sshd:session): session closed for user core Dec 13 02:06:51.076329 kernel: kauditd_printk_skb: 43 callbacks suppressed Dec 13 02:06:51.076459 kernel: audit: type=1106 audit(1734055611.069:1594): pid=5699 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:51.077688 systemd[1]: sshd@18-10.128.0.6:22-139.178.68.195:49336.service: Deactivated successfully. Dec 13 02:06:51.078923 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 02:06:51.081185 systemd-logind[1221]: Session 19 logged out. Waiting for processes to exit. Dec 13 02:06:51.083029 systemd-logind[1221]: Removed session 19. Dec 13 02:06:51.069000 audit[5699]: CRED_DISP pid=5699 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:51.120297 systemd[1]: Started sshd@19-10.128.0.6:22-139.178.68.195:49342.service. Dec 13 02:06:51.134875 kernel: audit: type=1104 audit(1734055611.069:1595): pid=5699 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:51.076000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.6:22-139.178.68.195:49336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:51.160304 kernel: audit: type=1131 audit(1734055611.076:1596): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.6:22-139.178.68.195:49336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:51.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.6:22-139.178.68.195:49342 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:51.186167 kernel: audit: type=1130 audit(1734055611.119:1597): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.6:22-139.178.68.195:49342 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:51.412000 audit[5724]: USER_ACCT pid=5724 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:51.445337 kernel: audit: type=1101 audit(1734055611.412:1598): pid=5724 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:51.445508 sshd[5724]: Accepted publickey for core from 139.178.68.195 port 49342 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:06:51.446775 sshd[5724]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:06:51.444000 audit[5724]: CRED_ACQ pid=5724 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:51.460064 systemd[1]: Started session-20.scope. Dec 13 02:06:51.461848 systemd-logind[1221]: New session 20 of user core. Dec 13 02:06:51.480146 kernel: audit: type=1103 audit(1734055611.444:1599): pid=5724 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:51.444000 audit[5724]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5c3f49f0 a2=3 a3=0 items=0 ppid=1 pid=5724 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:51.528245 kernel: audit: type=1006 audit(1734055611.444:1600): pid=5724 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Dec 13 02:06:51.528410 kernel: audit: type=1300 audit(1734055611.444:1600): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5c3f49f0 a2=3 a3=0 items=0 ppid=1 pid=5724 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:51.444000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:51.538029 kernel: audit: type=1327 audit(1734055611.444:1600): proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:51.538188 kernel: audit: type=1105 audit(1734055611.472:1601): pid=5724 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:51.472000 audit[5724]: USER_START pid=5724 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:51.482000 audit[5726]: CRED_ACQ pid=5726 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:51.746093 sshd[5724]: pam_unix(sshd:session): session closed for user core Dec 13 02:06:51.747000 audit[5724]: USER_END pid=5724 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:51.747000 audit[5724]: CRED_DISP pid=5724 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:51.751902 systemd-logind[1221]: Session 20 logged out. Waiting for processes to exit. Dec 13 02:06:51.752186 systemd[1]: sshd@19-10.128.0.6:22-139.178.68.195:49342.service: Deactivated successfully. Dec 13 02:06:51.753431 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 02:06:51.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.6:22-139.178.68.195:49342 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:51.755623 systemd-logind[1221]: Removed session 20. Dec 13 02:06:54.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.6:22-95.214.53.211:58626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:54.601827 systemd[1]: Started sshd@20-10.128.0.6:22-95.214.53.211:58626.service. Dec 13 02:06:56.794151 systemd[1]: Started sshd@21-10.128.0.6:22-139.178.68.195:50302.service. Dec 13 02:06:56.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.6:22-139.178.68.195:50302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:56.800452 kernel: kauditd_printk_skb: 5 callbacks suppressed Dec 13 02:06:56.800588 kernel: audit: type=1130 audit(1734055616.793:1607): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.6:22-139.178.68.195:50302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:57.092000 audit[5831]: USER_ACCT pid=5831 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:57.123596 sshd[5831]: Accepted publickey for core from 139.178.68.195 port 50302 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:06:57.124480 kernel: audit: type=1101 audit(1734055617.092:1608): pid=5831 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:57.124905 sshd[5831]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:06:57.122000 audit[5831]: CRED_ACQ pid=5831 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:57.134908 systemd[1]: Started session-21.scope. Dec 13 02:06:57.136772 systemd-logind[1221]: New session 21 of user core. Dec 13 02:06:57.153337 kernel: audit: type=1103 audit(1734055617.122:1609): pid=5831 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:57.153475 kernel: audit: type=1006 audit(1734055617.123:1610): pid=5831 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Dec 13 02:06:57.123000 audit[5831]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffdad6fa30 a2=3 a3=0 items=0 ppid=1 pid=5831 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:57.196882 kernel: audit: type=1300 audit(1734055617.123:1610): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffdad6fa30 a2=3 a3=0 items=0 ppid=1 pid=5831 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:57.197076 kernel: audit: type=1327 audit(1734055617.123:1610): proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:57.123000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:57.145000 audit[5831]: USER_START pid=5831 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:57.238788 kernel: audit: type=1105 audit(1734055617.145:1611): pid=5831 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:57.263593 kernel: audit: type=1103 audit(1734055617.151:1612): pid=5833 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:57.151000 audit[5833]: CRED_ACQ pid=5833 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:57.277000 audit[5835]: NETFILTER_CFG table=filter:131 family=2 entries=20 op=nft_register_rule pid=5835 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:57.295139 kernel: audit: type=1325 audit(1734055617.277:1613): table=filter:131 family=2 entries=20 op=nft_register_rule pid=5835 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:57.277000 audit[5835]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff730b25d0 a2=0 a3=7fff730b25bc items=0 ppid=2267 pid=5835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:57.329135 kernel: audit: type=1300 audit(1734055617.277:1613): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff730b25d0 a2=0 a3=7fff730b25bc items=0 ppid=2267 pid=5835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:57.277000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:57.334000 audit[5835]: NETFILTER_CFG table=nat:132 family=2 entries=106 op=nft_register_chain pid=5835 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:57.334000 audit[5835]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fff730b25d0 a2=0 a3=7fff730b25bc items=0 ppid=2267 pid=5835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:57.334000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:57.433644 sshd[5831]: pam_unix(sshd:session): session closed for user core Dec 13 02:06:57.434000 audit[5831]: USER_END pid=5831 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:57.434000 audit[5831]: CRED_DISP pid=5831 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:57.438000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.6:22-139.178.68.195:50302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:57.439201 systemd[1]: sshd@21-10.128.0.6:22-139.178.68.195:50302.service: Deactivated successfully. Dec 13 02:06:57.439205 systemd-logind[1221]: Session 21 logged out. Waiting for processes to exit. Dec 13 02:06:57.440474 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 02:06:57.441831 systemd-logind[1221]: Removed session 21. Dec 13 02:06:57.972000 audit[1969]: AVC avc: denied { watch } for pid=1969 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c681,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:06:57.972000 audit[1969]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000fd44b0 a2=fc6 a3=0 items=0 ppid=1813 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c681,c864 key=(null) Dec 13 02:06:57.972000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:06:57.978000 audit[1969]: AVC avc: denied { watch } for pid=1969 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520982 scontext=system_u:system_r:svirt_lxc_net_t:s0:c681,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:06:57.978000 audit[1969]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000a481e0 a2=fc6 a3=0 items=0 ppid=1813 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c681,c864 key=(null) Dec 13 02:06:57.978000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:06:58.023000 audit[2014]: AVC avc: denied { watch } for pid=2014 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c86,c871 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:06:58.023000 audit[2014]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c007f53590 a2=fc6 a3=0 items=0 ppid=1841 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c86,c871 key=(null) Dec 13 02:06:58.023000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E36002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 02:06:58.088000 audit[2014]: AVC avc: denied { watch } for pid=2014 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c86,c871 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:06:58.088000 audit[2014]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c007f53650 a2=fc6 a3=0 items=0 ppid=1841 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c86,c871 key=(null) Dec 13 02:06:58.088000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E36002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 02:06:58.113000 audit[2014]: AVC avc: denied { watch } for pid=2014 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520990 scontext=system_u:system_r:svirt_lxc_net_t:s0:c86,c871 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:06:58.113000 audit[2014]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c0080c1320 a2=fc6 a3=0 items=0 ppid=1841 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c86,c871 key=(null) Dec 13 02:06:58.113000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E36002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 02:06:58.114000 audit[2014]: AVC avc: denied { watch } for pid=2014 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520982 scontext=system_u:system_r:svirt_lxc_net_t:s0:c86,c871 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:06:58.114000 audit[2014]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00cf405e0 a2=fc6 a3=0 items=0 ppid=1841 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c86,c871 key=(null) Dec 13 02:06:58.114000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E36002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 02:06:58.180000 audit[2014]: AVC avc: denied { watch } for pid=2014 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c86,c871 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:06:58.180000 audit[2014]: AVC avc: denied { watch } for pid=2014 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520982 scontext=system_u:system_r:svirt_lxc_net_t:s0:c86,c871 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:06:58.180000 audit[2014]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c00d596340 a2=fc6 a3=0 items=0 ppid=1841 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c86,c871 key=(null) Dec 13 02:06:58.180000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E36002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 02:06:58.180000 audit[2014]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c0080e0a80 a2=fc6 a3=0 items=0 ppid=1841 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c86,c871 key=(null) Dec 13 02:06:58.180000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E36002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 02:07:01.034000 audit[4478]: AVC avc: denied { watch } for pid=4478 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_05_36.2115515708/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c594 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c489,c594 tclass=file permissive=0 Dec 13 02:07:01.034000 audit[4478]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00072fa20 a2=fc6 a3=0 items=0 ppid=3919 pid=4478 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c594 key=(null) Dec 13 02:07:01.034000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:07:01.677000 audit[1969]: AVC avc: denied { watch } for pid=1969 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520982 scontext=system_u:system_r:svirt_lxc_net_t:s0:c681,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:07:01.677000 audit[1969]: AVC avc: denied { watch } for pid=1969 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520982 scontext=system_u:system_r:svirt_lxc_net_t:s0:c681,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:07:01.677000 audit[1969]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000d364a0 a2=fc6 a3=0 items=0 ppid=1813 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c681,c864 key=(null) Dec 13 02:07:01.677000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:07:01.677000 audit[1969]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000a48640 a2=fc6 a3=0 items=0 ppid=1813 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c681,c864 key=(null) Dec 13 02:07:01.677000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:07:01.677000 audit[1969]: AVC avc: denied { watch } for pid=1969 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520982 scontext=system_u:system_r:svirt_lxc_net_t:s0:c681,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:07:01.677000 audit[1969]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000a48660 a2=fc6 a3=0 items=0 ppid=1813 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c681,c864 key=(null) Dec 13 02:07:01.677000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:07:01.680000 audit[1969]: AVC avc: denied { watch } for pid=1969 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520982 scontext=system_u:system_r:svirt_lxc_net_t:s0:c681,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:07:01.680000 audit[1969]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d36520 a2=fc6 a3=0 items=0 ppid=1813 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c681,c864 key=(null) Dec 13 02:07:01.680000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:07:02.482294 systemd[1]: Started sshd@22-10.128.0.6:22-139.178.68.195:50306.service. Dec 13 02:07:02.513698 kernel: kauditd_printk_skb: 46 callbacks suppressed Dec 13 02:07:02.513878 kernel: audit: type=1130 audit(1734055622.482:1631): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.6:22-139.178.68.195:50306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:07:02.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.6:22-139.178.68.195:50306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:07:02.780000 audit[5945]: USER_ACCT pid=5945 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:02.811626 sshd[5945]: Accepted publickey for core from 139.178.68.195 port 50306 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:07:02.812660 kernel: audit: type=1101 audit(1734055622.780:1632): pid=5945 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:02.812792 sshd[5945]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:07:02.810000 audit[5945]: CRED_ACQ pid=5945 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:02.821758 systemd[1]: Started session-22.scope. Dec 13 02:07:02.824390 systemd-logind[1221]: New session 22 of user core. Dec 13 02:07:02.840197 kernel: audit: type=1103 audit(1734055622.810:1633): pid=5945 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:02.810000 audit[5945]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc48b1c8a0 a2=3 a3=0 items=0 ppid=1 pid=5945 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:02.887279 kernel: audit: type=1006 audit(1734055622.810:1634): pid=5945 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Dec 13 02:07:02.887471 kernel: audit: type=1300 audit(1734055622.810:1634): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc48b1c8a0 a2=3 a3=0 items=0 ppid=1 pid=5945 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:02.887521 kernel: audit: type=1327 audit(1734055622.810:1634): proctitle=737368643A20636F7265205B707269765D Dec 13 02:07:02.810000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:07:02.833000 audit[5945]: USER_START pid=5945 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:02.929317 kernel: audit: type=1105 audit(1734055622.833:1635): pid=5945 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:02.841000 audit[5947]: CRED_ACQ pid=5947 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:02.954198 kernel: audit: type=1103 audit(1734055622.841:1636): pid=5947 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:02.939000 audit[4555]: AVC avc: denied { watch } for pid=4555 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_05_36.2707603075/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c579,c596 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c579,c596 tclass=file permissive=0 Dec 13 02:07:02.992200 kernel: audit: type=1400 audit(1734055622.939:1637): avc: denied { watch } for pid=4555 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_05_36.2707603075/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c579,c596 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c579,c596 tclass=file permissive=0 Dec 13 02:07:02.992371 kernel: audit: type=1300 audit(1734055622.939:1637): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0017606c0 a2=fc6 a3=0 items=0 ppid=4170 pid=4555 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c579,c596 key=(null) Dec 13 02:07:02.939000 audit[4555]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0017606c0 a2=fc6 a3=0 items=0 ppid=4170 pid=4555 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c579,c596 key=(null) Dec 13 02:07:02.939000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:07:03.130755 sshd[5945]: pam_unix(sshd:session): session closed for user core Dec 13 02:07:03.131000 audit[5945]: USER_END pid=5945 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:03.131000 audit[5945]: CRED_DISP pid=5945 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:03.135971 systemd[1]: sshd@22-10.128.0.6:22-139.178.68.195:50306.service: Deactivated successfully. Dec 13 02:07:03.135000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.6:22-139.178.68.195:50306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:07:03.137419 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 02:07:03.138399 systemd-logind[1221]: Session 22 logged out. Waiting for processes to exit. Dec 13 02:07:03.139770 systemd-logind[1221]: Removed session 22. Dec 13 02:07:03.262530 env[1236]: time="2024-12-13T02:07:03.262463483Z" level=info msg="StopPodSandbox for \"a87e68123b85801f35cca1a9379d96b0de0c0325f8b47890ca58f00001cf4b6d\"" Dec 13 02:07:03.263170 env[1236]: time="2024-12-13T02:07:03.262601651Z" level=info msg="TearDown network for sandbox \"a87e68123b85801f35cca1a9379d96b0de0c0325f8b47890ca58f00001cf4b6d\" successfully" Dec 13 02:07:03.263170 env[1236]: time="2024-12-13T02:07:03.262654842Z" level=info msg="StopPodSandbox for \"a87e68123b85801f35cca1a9379d96b0de0c0325f8b47890ca58f00001cf4b6d\" returns successfully" Dec 13 02:07:03.263513 env[1236]: time="2024-12-13T02:07:03.263460205Z" level=info msg="RemovePodSandbox for \"a87e68123b85801f35cca1a9379d96b0de0c0325f8b47890ca58f00001cf4b6d\"" Dec 13 02:07:03.263656 env[1236]: time="2024-12-13T02:07:03.263510351Z" level=info msg="Forcibly stopping sandbox \"a87e68123b85801f35cca1a9379d96b0de0c0325f8b47890ca58f00001cf4b6d\"" Dec 13 02:07:03.263656 env[1236]: time="2024-12-13T02:07:03.263627474Z" level=info msg="TearDown network for sandbox \"a87e68123b85801f35cca1a9379d96b0de0c0325f8b47890ca58f00001cf4b6d\" successfully" Dec 13 02:07:03.269156 env[1236]: time="2024-12-13T02:07:03.269051824Z" level=info msg="RemovePodSandbox \"a87e68123b85801f35cca1a9379d96b0de0c0325f8b47890ca58f00001cf4b6d\" returns successfully" Dec 13 02:07:03.269985 env[1236]: time="2024-12-13T02:07:03.269944282Z" level=info msg="StopPodSandbox for \"4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155\"" Dec 13 02:07:03.363702 env[1236]: 2024-12-13 02:07:03.319 [WARNING][5970] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbc6f5ff--k644c-eth0" Dec 13 02:07:03.363702 env[1236]: 2024-12-13 02:07:03.319 [INFO][5970] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" Dec 13 02:07:03.363702 env[1236]: 2024-12-13 02:07:03.319 [INFO][5970] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" iface="eth0" netns="" Dec 13 02:07:03.363702 env[1236]: 2024-12-13 02:07:03.319 [INFO][5970] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" Dec 13 02:07:03.363702 env[1236]: 2024-12-13 02:07:03.319 [INFO][5970] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" Dec 13 02:07:03.363702 env[1236]: 2024-12-13 02:07:03.349 [INFO][5976] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" HandleID="k8s-pod-network.4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbc6f5ff--k644c-eth0" Dec 13 02:07:03.363702 env[1236]: 2024-12-13 02:07:03.349 [INFO][5976] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:07:03.363702 env[1236]: 2024-12-13 02:07:03.350 [INFO][5976] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:07:03.363702 env[1236]: 2024-12-13 02:07:03.357 [WARNING][5976] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" HandleID="k8s-pod-network.4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbc6f5ff--k644c-eth0" Dec 13 02:07:03.363702 env[1236]: 2024-12-13 02:07:03.358 [INFO][5976] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" HandleID="k8s-pod-network.4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbc6f5ff--k644c-eth0" Dec 13 02:07:03.363702 env[1236]: 2024-12-13 02:07:03.361 [INFO][5976] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:07:03.363702 env[1236]: 2024-12-13 02:07:03.362 [INFO][5970] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" Dec 13 02:07:03.364629 env[1236]: time="2024-12-13T02:07:03.364578549Z" level=info msg="TearDown network for sandbox \"4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155\" successfully" Dec 13 02:07:03.364813 env[1236]: time="2024-12-13T02:07:03.364777071Z" level=info msg="StopPodSandbox for \"4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155\" returns successfully" Dec 13 02:07:03.365811 env[1236]: time="2024-12-13T02:07:03.365770907Z" level=info msg="RemovePodSandbox for \"4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155\"" Dec 13 02:07:03.366069 env[1236]: time="2024-12-13T02:07:03.366001533Z" level=info msg="Forcibly stopping sandbox \"4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155\"" Dec 13 02:07:03.475487 env[1236]: 2024-12-13 02:07:03.414 [WARNING][5996] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" WorkloadEndpoint="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbc6f5ff--k644c-eth0" Dec 13 02:07:03.475487 env[1236]: 2024-12-13 02:07:03.414 [INFO][5996] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" Dec 13 02:07:03.475487 env[1236]: 2024-12-13 02:07:03.414 [INFO][5996] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" iface="eth0" netns="" Dec 13 02:07:03.475487 env[1236]: 2024-12-13 02:07:03.414 [INFO][5996] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" Dec 13 02:07:03.475487 env[1236]: 2024-12-13 02:07:03.414 [INFO][5996] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" Dec 13 02:07:03.475487 env[1236]: 2024-12-13 02:07:03.454 [INFO][6002] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" HandleID="k8s-pod-network.4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbc6f5ff--k644c-eth0" Dec 13 02:07:03.475487 env[1236]: 2024-12-13 02:07:03.455 [INFO][6002] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:07:03.475487 env[1236]: 2024-12-13 02:07:03.455 [INFO][6002] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:07:03.475487 env[1236]: 2024-12-13 02:07:03.467 [WARNING][6002] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" HandleID="k8s-pod-network.4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbc6f5ff--k644c-eth0" Dec 13 02:07:03.475487 env[1236]: 2024-12-13 02:07:03.467 [INFO][6002] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" HandleID="k8s-pod-network.4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" Workload="ci--3510--3--6--1953990c6081bf67a15e.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbc6f5ff--k644c-eth0" Dec 13 02:07:03.475487 env[1236]: 2024-12-13 02:07:03.472 [INFO][6002] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:07:03.475487 env[1236]: 2024-12-13 02:07:03.473 [INFO][5996] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155" Dec 13 02:07:03.477225 env[1236]: time="2024-12-13T02:07:03.477134655Z" level=info msg="TearDown network for sandbox \"4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155\" successfully" Dec 13 02:07:03.483494 env[1236]: time="2024-12-13T02:07:03.483388810Z" level=info msg="RemovePodSandbox \"4e54a7f3aff6310570edb2264a052f7837c082419498436789a8e597e50f2155\" returns successfully" Dec 13 02:07:05.464000 audit[6059]: AVC avc: denied { bpf } for pid=6059 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.464000 audit[6059]: AVC avc: denied { bpf } for pid=6059 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.464000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.464000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.464000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.464000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.464000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.464000 audit[6059]: AVC avc: denied { bpf } for pid=6059 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.464000 audit[6059]: AVC avc: denied { bpf } for pid=6059 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.464000 audit: BPF prog-id=224 op=LOAD Dec 13 02:07:05.464000 audit[6059]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff5480f260 a2=98 a3=3 items=0 ppid=6046 pid=6059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.464000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:07:05.464000 audit: BPF prog-id=224 op=UNLOAD Dec 13 02:07:05.464000 audit[6059]: AVC avc: denied { bpf } for pid=6059 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.464000 audit[6059]: AVC avc: denied { bpf } for pid=6059 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.464000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.464000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.464000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.464000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.464000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.464000 audit[6059]: AVC avc: denied { bpf } for pid=6059 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.464000 audit[6059]: AVC avc: denied { bpf } for pid=6059 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.464000 audit: BPF prog-id=225 op=LOAD Dec 13 02:07:05.464000 audit[6059]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff5480f040 a2=74 a3=540051 items=0 ppid=6046 pid=6059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.464000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:07:05.465000 audit: BPF prog-id=225 op=UNLOAD Dec 13 02:07:05.465000 audit[6059]: AVC avc: denied { bpf } for pid=6059 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.465000 audit[6059]: AVC avc: denied { bpf } for pid=6059 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.465000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.465000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.465000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.465000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.465000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.465000 audit[6059]: AVC avc: denied { bpf } for pid=6059 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.465000 audit[6059]: AVC avc: denied { bpf } for pid=6059 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.465000 audit: BPF prog-id=226 op=LOAD Dec 13 02:07:05.465000 audit[6059]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff5480f070 a2=94 a3=2 items=0 ppid=6046 pid=6059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.465000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:07:05.465000 audit: BPF prog-id=226 op=UNLOAD Dec 13 02:07:05.592000 audit[6059]: AVC avc: denied { bpf } for pid=6059 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.592000 audit[6059]: AVC avc: denied { bpf } for pid=6059 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.592000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.592000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.592000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.592000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.592000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.592000 audit[6059]: AVC avc: denied { bpf } for pid=6059 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.592000 audit[6059]: AVC avc: denied { bpf } for pid=6059 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.592000 audit: BPF prog-id=227 op=LOAD Dec 13 02:07:05.592000 audit[6059]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff5480ef30 a2=40 a3=1 items=0 ppid=6046 pid=6059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.592000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:07:05.592000 audit: BPF prog-id=227 op=UNLOAD Dec 13 02:07:05.592000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.592000 audit[6059]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff5480f000 a2=50 a3=7fff5480f0e0 items=0 ppid=6046 pid=6059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.592000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:07:05.604000 audit[6059]: AVC avc: denied { bpf } for pid=6059 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.604000 audit[6059]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff5480ef40 a2=28 a3=0 items=0 ppid=6046 pid=6059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.604000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:07:05.604000 audit[6059]: AVC avc: denied { bpf } for pid=6059 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.604000 audit[6059]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff5480ef70 a2=28 a3=0 items=0 ppid=6046 pid=6059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.604000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:07:05.604000 audit[6059]: AVC avc: denied { bpf } for pid=6059 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.604000 audit[6059]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff5480ee80 a2=28 a3=0 items=0 ppid=6046 pid=6059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.604000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:07:05.604000 audit[6059]: AVC avc: denied { bpf } for pid=6059 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.604000 audit[6059]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff5480ef90 a2=28 a3=0 items=0 ppid=6046 pid=6059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.604000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:07:05.604000 audit[6059]: AVC avc: denied { bpf } for pid=6059 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.604000 audit[6059]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff5480ef70 a2=28 a3=0 items=0 ppid=6046 pid=6059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.604000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:07:05.604000 audit[6059]: AVC avc: denied { bpf } for pid=6059 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.604000 audit[6059]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff5480ef60 a2=28 a3=0 items=0 ppid=6046 pid=6059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.604000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:07:05.604000 audit[6059]: AVC avc: denied { bpf } for pid=6059 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.604000 audit[6059]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff5480ef90 a2=28 a3=0 items=0 ppid=6046 pid=6059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.604000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:07:05.604000 audit[6059]: AVC avc: denied { bpf } for pid=6059 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.604000 audit[6059]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff5480ef70 a2=28 a3=0 items=0 ppid=6046 pid=6059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.604000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:07:05.604000 audit[6059]: AVC avc: denied { bpf } for pid=6059 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.604000 audit[6059]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff5480ef90 a2=28 a3=0 items=0 ppid=6046 pid=6059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.604000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:07:05.604000 audit[6059]: AVC avc: denied { bpf } for pid=6059 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.604000 audit[6059]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff5480ef60 a2=28 a3=0 items=0 ppid=6046 pid=6059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.604000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:07:05.604000 audit[6059]: AVC avc: denied { bpf } for pid=6059 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.604000 audit[6059]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff5480efd0 a2=28 a3=0 items=0 ppid=6046 pid=6059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.604000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:07:05.605000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.605000 audit[6059]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff5480ed80 a2=50 a3=1 items=0 ppid=6046 pid=6059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.605000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:07:05.605000 audit[6059]: AVC avc: denied { bpf } for pid=6059 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.605000 audit[6059]: AVC avc: denied { bpf } for pid=6059 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.605000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.605000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.605000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.605000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.605000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.605000 audit[6059]: AVC avc: denied { bpf } for pid=6059 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.605000 audit[6059]: AVC avc: denied { bpf } for pid=6059 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.605000 audit: BPF prog-id=228 op=LOAD Dec 13 02:07:05.605000 audit[6059]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff5480ed80 a2=94 a3=5 items=0 ppid=6046 pid=6059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.605000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:07:05.605000 audit: BPF prog-id=228 op=UNLOAD Dec 13 02:07:05.605000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.605000 audit[6059]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff5480ee30 a2=50 a3=1 items=0 ppid=6046 pid=6059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.605000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:07:05.605000 audit[6059]: AVC avc: denied { bpf } for pid=6059 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.605000 audit[6059]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff5480ef50 a2=4 a3=38 items=0 ppid=6046 pid=6059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.605000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:07:05.605000 audit[6059]: AVC avc: denied { bpf } for pid=6059 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.605000 audit[6059]: AVC avc: denied { bpf } for pid=6059 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.605000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.605000 audit[6059]: AVC avc: denied { bpf } for pid=6059 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.605000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.605000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.605000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.605000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.605000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.605000 audit[6059]: AVC avc: denied { bpf } for pid=6059 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.605000 audit[6059]: AVC avc: denied { confidentiality } for pid=6059 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:05.605000 audit[6059]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff5480efa0 a2=94 a3=6 items=0 ppid=6046 pid=6059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.605000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:07:05.605000 audit[6059]: AVC avc: denied { bpf } for pid=6059 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.605000 audit[6059]: AVC avc: denied { bpf } for pid=6059 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.605000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.605000 audit[6059]: AVC avc: denied { bpf } for pid=6059 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.605000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.605000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.605000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.605000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.605000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.605000 audit[6059]: AVC avc: denied { bpf } for pid=6059 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.605000 audit[6059]: AVC avc: denied { confidentiality } for pid=6059 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:05.605000 audit[6059]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff5480e750 a2=94 a3=83 items=0 ppid=6046 pid=6059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.605000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:07:05.606000 audit[6059]: AVC avc: denied { bpf } for pid=6059 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.606000 audit[6059]: AVC avc: denied { bpf } for pid=6059 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.606000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.606000 audit[6059]: AVC avc: denied { bpf } for pid=6059 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.606000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.606000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.606000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.606000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.606000 audit[6059]: AVC avc: denied { perfmon } for pid=6059 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.606000 audit[6059]: AVC avc: denied { bpf } for pid=6059 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.606000 audit[6059]: AVC avc: denied { confidentiality } for pid=6059 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:05.606000 audit[6059]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff5480e750 a2=94 a3=83 items=0 ppid=6046 pid=6059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.606000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:07:05.610000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.610000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.610000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.610000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.610000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.610000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.610000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.610000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.610000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.610000 audit: BPF prog-id=229 op=LOAD Dec 13 02:07:05.610000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffd6f83900 a2=98 a3=3 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.610000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.610000 audit: BPF prog-id=229 op=UNLOAD Dec 13 02:07:05.610000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.610000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.610000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.610000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.610000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.610000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.610000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.610000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.610000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.610000 audit: BPF prog-id=230 op=LOAD Dec 13 02:07:05.610000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffd6f836e0 a2=74 a3=540051 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.610000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.610000 audit: BPF prog-id=230 op=UNLOAD Dec 13 02:07:05.610000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.610000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.610000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.610000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.610000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.610000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.610000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.610000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.610000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.610000 audit: BPF prog-id=231 op=LOAD Dec 13 02:07:05.610000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffd6f83710 a2=94 a3=2 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.610000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.611000 audit: BPF prog-id=231 op=UNLOAD Dec 13 02:07:05.738000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.738000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.738000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.738000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.738000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.738000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.738000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.738000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.738000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.738000 audit: BPF prog-id=232 op=LOAD Dec 13 02:07:05.738000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffd6f835d0 a2=40 a3=1 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.738000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.738000 audit: BPF prog-id=232 op=UNLOAD Dec 13 02:07:05.738000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.738000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffd6f836a0 a2=50 a3=7fffd6f83780 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.738000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.754000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.754000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffd6f835e0 a2=28 a3=0 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.754000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.754000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.754000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd6f83610 a2=28 a3=0 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.754000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.754000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.754000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd6f83520 a2=28 a3=0 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.754000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.754000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.754000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffd6f83630 a2=28 a3=0 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.754000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.754000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.754000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffd6f83610 a2=28 a3=0 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.754000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.754000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.754000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffd6f83600 a2=28 a3=0 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.754000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.754000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.754000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffd6f83630 a2=28 a3=0 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.754000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.754000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.754000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd6f83610 a2=28 a3=0 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.754000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.754000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.754000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd6f83630 a2=28 a3=0 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.754000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.754000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.754000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd6f83600 a2=28 a3=0 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.754000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.754000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.754000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffd6f83670 a2=28 a3=0 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.754000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.754000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.754000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffd6f83420 a2=50 a3=1 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.754000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.754000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.754000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.754000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.754000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.754000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.754000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.754000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.754000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.754000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.754000 audit: BPF prog-id=233 op=LOAD Dec 13 02:07:05.754000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffd6f83420 a2=94 a3=5 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.754000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.755000 audit: BPF prog-id=233 op=UNLOAD Dec 13 02:07:05.755000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.755000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffd6f834d0 a2=50 a3=1 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.755000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.755000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.755000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fffd6f835f0 a2=4 a3=38 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.755000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.755000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.755000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.755000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.755000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.755000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.755000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.755000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.755000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.755000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.755000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.755000 audit[6060]: AVC avc: denied { confidentiality } for pid=6060 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:05.755000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffd6f83640 a2=94 a3=6 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.755000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.755000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.755000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.755000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.755000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.755000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.755000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.755000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.755000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.755000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.755000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.755000 audit[6060]: AVC avc: denied { confidentiality } for pid=6060 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:05.755000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffd6f82df0 a2=94 a3=83 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.755000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.755000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.755000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.755000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.755000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.755000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.755000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.755000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.755000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.755000 audit[6060]: AVC avc: denied { perfmon } for pid=6060 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.755000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.755000 audit[6060]: AVC avc: denied { confidentiality } for pid=6060 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:05.755000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffd6f82df0 a2=94 a3=83 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.755000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.756000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.756000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=0 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.756000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.756000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.756000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=40 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.756000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.756000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.756000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=44 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.756000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.756000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.756000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=48 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.756000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.756000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.756000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=4c items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.756000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.756000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.756000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=50 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.756000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.757000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.757000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=54 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.757000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.757000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.757000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=55 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.757000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.757000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.757000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=56 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.757000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.757000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.757000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=57 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.757000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.757000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.757000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=58 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.757000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.757000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.757000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=59 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.757000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.757000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.757000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=5a items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.757000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.757000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.757000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=5b items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.757000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.757000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.757000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=5c items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.757000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.757000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.757000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=5d items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.757000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.757000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.757000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=5e items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.757000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.757000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.757000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=5f items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.757000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.757000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.757000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=60 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.757000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.757000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.757000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=61 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.757000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.757000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.757000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=62 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.757000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.758000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.758000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=63 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.758000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.758000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.758000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=64 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.758000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.758000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.758000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=65 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.758000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.758000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.758000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=66 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.758000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.758000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.758000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=67 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.758000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.758000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.758000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=68 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.758000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.758000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.758000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=69 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.758000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.758000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.758000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=6a items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.758000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.758000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.758000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=6d items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.758000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.758000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.758000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=70 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.758000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.758000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.758000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=71 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.758000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.758000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.758000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=74 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.758000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.758000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.758000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=75 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.758000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.758000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.758000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=78 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.758000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.758000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.758000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=79 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.758000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.758000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.758000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=7c items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.758000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.758000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.758000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=8d items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.758000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.759000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.759000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=8e items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.759000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.759000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.759000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=91 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.759000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.759000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.759000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=92 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.759000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.759000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.759000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=95 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.759000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.759000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.759000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=9a items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.759000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.759000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.759000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=9d items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.759000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.759000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.759000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=9e items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.759000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.759000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.759000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=9f items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.759000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.759000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.759000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=a2 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.759000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.759000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.759000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=a5 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.759000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.759000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.759000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=a6 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.759000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.759000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.759000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=a9 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.759000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.759000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.759000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=ac items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.759000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.759000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.759000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=ad items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.759000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.759000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.759000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=b0 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.759000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.760000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.760000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=c8 items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.760000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.760000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.760000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=cb items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.760000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.760000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.760000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=ce items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.760000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.760000 audit[6060]: AVC avc: denied { bpf } for pid=6060 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.760000 audit[6060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6f84830 a2=10 a3=cf items=0 ppid=6046 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.760000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 02:07:05.774000 audit[6063]: AVC avc: denied { bpf } for pid=6063 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.774000 audit[6063]: AVC avc: denied { bpf } for pid=6063 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.774000 audit[6063]: AVC avc: denied { perfmon } for pid=6063 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.774000 audit[6063]: AVC avc: denied { perfmon } for pid=6063 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.774000 audit[6063]: AVC avc: denied { perfmon } for pid=6063 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.774000 audit[6063]: AVC avc: denied { perfmon } for pid=6063 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.774000 audit[6063]: AVC avc: denied { perfmon } for pid=6063 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.774000 audit[6063]: AVC avc: denied { bpf } for pid=6063 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.774000 audit[6063]: AVC avc: denied { bpf } for pid=6063 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.774000 audit: BPF prog-id=234 op=LOAD Dec 13 02:07:05.774000 audit[6063]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcd3c2f010 a2=98 a3=1999999999999999 items=0 ppid=6046 pid=6063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.774000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:07:05.775000 audit: BPF prog-id=234 op=UNLOAD Dec 13 02:07:05.775000 audit[6063]: AVC avc: denied { bpf } for pid=6063 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.775000 audit[6063]: AVC avc: denied { bpf } for pid=6063 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.775000 audit[6063]: AVC avc: denied { perfmon } for pid=6063 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.775000 audit[6063]: AVC avc: denied { perfmon } for pid=6063 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.775000 audit[6063]: AVC avc: denied { perfmon } for pid=6063 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.775000 audit[6063]: AVC avc: denied { perfmon } for pid=6063 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.775000 audit[6063]: AVC avc: denied { perfmon } for pid=6063 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.775000 audit[6063]: AVC avc: denied { bpf } for pid=6063 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.775000 audit[6063]: AVC avc: denied { bpf } for pid=6063 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.775000 audit: BPF prog-id=235 op=LOAD Dec 13 02:07:05.775000 audit[6063]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcd3c2eef0 a2=74 a3=ffff items=0 ppid=6046 pid=6063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.775000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:07:05.775000 audit: BPF prog-id=235 op=UNLOAD Dec 13 02:07:05.775000 audit[6063]: AVC avc: denied { bpf } for pid=6063 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.775000 audit[6063]: AVC avc: denied { bpf } for pid=6063 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.775000 audit[6063]: AVC avc: denied { perfmon } for pid=6063 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.775000 audit[6063]: AVC avc: denied { perfmon } for pid=6063 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.775000 audit[6063]: AVC avc: denied { perfmon } for pid=6063 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.775000 audit[6063]: AVC avc: denied { perfmon } for pid=6063 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.775000 audit[6063]: AVC avc: denied { perfmon } for pid=6063 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.775000 audit[6063]: AVC avc: denied { bpf } for pid=6063 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.775000 audit[6063]: AVC avc: denied { bpf } for pid=6063 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:05.775000 audit: BPF prog-id=236 op=LOAD Dec 13 02:07:05.775000 audit[6063]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcd3c2ef30 a2=40 a3=7ffcd3c2f110 items=0 ppid=6046 pid=6063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:05.775000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:07:05.775000 audit: BPF prog-id=236 op=UNLOAD Dec 13 02:07:08.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.6:22-139.178.68.195:42822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:07:08.177972 systemd[1]: Started sshd@23-10.128.0.6:22-139.178.68.195:42822.service. Dec 13 02:07:08.184619 kernel: kauditd_printk_skb: 512 callbacks suppressed Dec 13 02:07:08.184726 kernel: audit: type=1130 audit(1734055628.177:1760): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.6:22-139.178.68.195:42822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:07:08.482000 audit[6118]: USER_ACCT pid=6118 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:08.486048 sshd[6118]: Accepted publickey for core from 139.178.68.195 port 42822 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:07:08.514322 kernel: audit: type=1101 audit(1734055628.482:1761): pid=6118 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:08.514774 sshd[6118]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:07:08.512000 audit[6118]: CRED_ACQ pid=6118 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:08.523607 systemd-logind[1221]: New session 23 of user core. Dec 13 02:07:08.525054 systemd[1]: Started session-23.scope. Dec 13 02:07:08.546186 kernel: audit: type=1103 audit(1734055628.512:1762): pid=6118 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:08.564147 kernel: audit: type=1006 audit(1734055628.513:1763): pid=6118 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Dec 13 02:07:08.564298 kernel: audit: type=1300 audit(1734055628.513:1763): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc00e39780 a2=3 a3=0 items=0 ppid=1 pid=6118 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:08.513000 audit[6118]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc00e39780 a2=3 a3=0 items=0 ppid=1 pid=6118 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:08.513000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:07:08.545000 audit[6118]: USER_START pid=6118 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:08.633082 kernel: audit: type=1327 audit(1734055628.513:1763): proctitle=737368643A20636F7265205B707269765D Dec 13 02:07:08.633268 kernel: audit: type=1105 audit(1734055628.545:1764): pid=6118 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:08.556000 audit[6141]: CRED_ACQ pid=6141 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:08.658153 kernel: audit: type=1103 audit(1734055628.556:1765): pid=6141 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:08.825000 audit[6118]: USER_END pid=6118 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:08.825081 sshd[6118]: pam_unix(sshd:session): session closed for user core Dec 13 02:07:08.830880 systemd-logind[1221]: Session 23 logged out. Waiting for processes to exit. Dec 13 02:07:08.833449 systemd[1]: sshd@23-10.128.0.6:22-139.178.68.195:42822.service: Deactivated successfully. Dec 13 02:07:08.834622 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 02:07:08.836813 systemd-logind[1221]: Removed session 23. Dec 13 02:07:08.825000 audit[6118]: CRED_DISP pid=6118 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:08.883642 kernel: audit: type=1106 audit(1734055628.825:1766): pid=6118 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:08.883839 kernel: audit: type=1104 audit(1734055628.825:1767): pid=6118 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:08.832000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.6:22-139.178.68.195:42822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:07:13.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.128.0.6:22-139.178.68.195:42832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:07:13.873598 systemd[1]: Started sshd@24-10.128.0.6:22-139.178.68.195:42832.service. Dec 13 02:07:13.903785 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 02:07:13.903958 kernel: audit: type=1130 audit(1734055633.872:1769): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.128.0.6:22-139.178.68.195:42832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:07:14.176000 audit[6228]: USER_ACCT pid=6228 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:14.207972 sshd[6228]: Accepted publickey for core from 139.178.68.195 port 42832 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:07:14.208433 kernel: audit: type=1101 audit(1734055634.176:1770): pid=6228 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:14.209141 sshd[6228]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:07:14.207000 audit[6228]: CRED_ACQ pid=6228 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:14.239140 kernel: audit: type=1103 audit(1734055634.207:1771): pid=6228 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:14.245893 systemd[1]: Started session-24.scope. Dec 13 02:07:14.257144 kernel: audit: type=1006 audit(1734055634.207:1772): pid=6228 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Dec 13 02:07:14.257480 systemd-logind[1221]: New session 24 of user core. Dec 13 02:07:14.207000 audit[6228]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdce60f420 a2=3 a3=0 items=0 ppid=1 pid=6228 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:14.287155 kernel: audit: type=1300 audit(1734055634.207:1772): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdce60f420 a2=3 a3=0 items=0 ppid=1 pid=6228 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:14.207000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:07:14.298148 kernel: audit: type=1327 audit(1734055634.207:1772): proctitle=737368643A20636F7265205B707269765D Dec 13 02:07:14.305000 audit[6228]: USER_START pid=6228 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:14.305000 audit[6249]: CRED_ACQ pid=6249 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:14.363813 kernel: audit: type=1105 audit(1734055634.305:1773): pid=6228 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:14.363996 kernel: audit: type=1103 audit(1734055634.305:1774): pid=6249 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:14.560324 sshd[6228]: pam_unix(sshd:session): session closed for user core Dec 13 02:07:14.561000 audit[6228]: USER_END pid=6228 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:14.595137 kernel: audit: type=1106 audit(1734055634.561:1775): pid=6228 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:14.561000 audit[6228]: CRED_DISP pid=6228 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:14.597217 systemd[1]: sshd@24-10.128.0.6:22-139.178.68.195:42832.service: Deactivated successfully. Dec 13 02:07:14.598491 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 02:07:14.601363 systemd-logind[1221]: Session 24 logged out. Waiting for processes to exit. Dec 13 02:07:14.603286 systemd-logind[1221]: Removed session 24. Dec 13 02:07:14.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.128.0.6:22-139.178.68.195:42832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:07:14.620133 kernel: audit: type=1104 audit(1734055634.561:1776): pid=6228 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:18.643439 systemd[1]: run-containerd-runc-k8s.io-6ed3452c5b5a4793680bd922c9e9bebb39e3172741e5bd0529ab4c55940322f9-runc.XeU4pH.mount: Deactivated successfully. Dec 13 02:07:19.608378 systemd[1]: Started sshd@25-10.128.0.6:22-139.178.68.195:53178.service. Dec 13 02:07:19.639488 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 02:07:19.639611 kernel: audit: type=1130 audit(1734055639.607:1778): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.128.0.6:22-139.178.68.195:53178 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:07:19.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.128.0.6:22-139.178.68.195:53178 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:07:19.906000 audit[6361]: USER_ACCT pid=6361 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:19.908125 sshd[6361]: Accepted publickey for core from 139.178.68.195 port 53178 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:07:19.938166 kernel: audit: type=1101 audit(1734055639.906:1779): pid=6361 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:19.937000 audit[6361]: CRED_ACQ pid=6361 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:19.939829 sshd[6361]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:07:19.950064 systemd[1]: Started session-25.scope. Dec 13 02:07:19.952038 systemd-logind[1221]: New session 25 of user core. Dec 13 02:07:19.981214 kernel: audit: type=1103 audit(1734055639.937:1780): pid=6361 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:19.981401 kernel: audit: type=1006 audit(1734055639.937:1781): pid=6361 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Dec 13 02:07:19.937000 audit[6361]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0df323c0 a2=3 a3=0 items=0 ppid=1 pid=6361 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:19.982143 kernel: audit: type=1300 audit(1734055639.937:1781): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0df323c0 a2=3 a3=0 items=0 ppid=1 pid=6361 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:19.937000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:07:20.010250 kernel: audit: type=1327 audit(1734055639.937:1781): proctitle=737368643A20636F7265205B707269765D Dec 13 02:07:19.963000 audit[6361]: USER_START pid=6361 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:20.052563 kernel: audit: type=1105 audit(1734055639.963:1782): pid=6361 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:20.054006 kernel: audit: type=1103 audit(1734055639.968:1783): pid=6363 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:19.968000 audit[6363]: CRED_ACQ pid=6363 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:20.295453 sshd[6361]: pam_unix(sshd:session): session closed for user core Dec 13 02:07:20.296000 audit[6361]: USER_END pid=6361 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:20.312000 audit[6361]: CRED_DISP pid=6361 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:20.332639 systemd[1]: sshd@25-10.128.0.6:22-139.178.68.195:53178.service: Deactivated successfully. Dec 13 02:07:20.333885 systemd[1]: session-25.scope: Deactivated successfully. Dec 13 02:07:20.335759 systemd-logind[1221]: Session 25 logged out. Waiting for processes to exit. Dec 13 02:07:20.337658 systemd-logind[1221]: Removed session 25. Dec 13 02:07:20.354768 kernel: audit: type=1106 audit(1734055640.296:1784): pid=6361 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:20.354946 kernel: audit: type=1104 audit(1734055640.312:1785): pid=6361 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:20.329000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.128.0.6:22-139.178.68.195:53178 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:07:24.888422 sshd[5792]: kex_exchange_identification: Connection closed by remote host Dec 13 02:07:24.888422 sshd[5792]: Connection closed by 95.214.53.211 port 58626 Dec 13 02:07:24.889457 systemd[1]: sshd@20-10.128.0.6:22-95.214.53.211:58626.service: Deactivated successfully. Dec 13 02:07:24.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.6:22-95.214.53.211:58626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:07:24.895418 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 02:07:24.895562 kernel: audit: type=1131 audit(1734055644.888:1787): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.6:22-95.214.53.211:58626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:07:25.341552 systemd[1]: Started sshd@26-10.128.0.6:22-139.178.68.195:53190.service. Dec 13 02:07:25.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.128.0.6:22-139.178.68.195:53190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:07:25.367161 kernel: audit: type=1130 audit(1734055645.341:1788): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.128.0.6:22-139.178.68.195:53190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:07:25.675616 kernel: audit: type=1101 audit(1734055645.641:1789): pid=6471 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:25.641000 audit[6471]: USER_ACCT pid=6471 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:25.674948 sshd[6471]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:07:25.676978 sshd[6471]: Accepted publickey for core from 139.178.68.195 port 53190 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:07:25.705305 kernel: audit: type=1103 audit(1734055645.673:1790): pid=6471 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:25.673000 audit[6471]: CRED_ACQ pid=6471 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:25.695784 systemd-logind[1221]: New session 26 of user core. Dec 13 02:07:25.696636 systemd[1]: Started session-26.scope. Dec 13 02:07:25.673000 audit[6471]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff63294600 a2=3 a3=0 items=0 ppid=1 pid=6471 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:25.754377 kernel: audit: type=1006 audit(1734055645.673:1791): pid=6471 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Dec 13 02:07:25.754561 kernel: audit: type=1300 audit(1734055645.673:1791): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff63294600 a2=3 a3=0 items=0 ppid=1 pid=6471 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:25.764147 kernel: audit: type=1327 audit(1734055645.673:1791): proctitle=737368643A20636F7265205B707269765D Dec 13 02:07:25.673000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:07:25.739000 audit[6471]: USER_START pid=6471 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:25.798892 kernel: audit: type=1105 audit(1734055645.739:1792): pid=6471 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:25.744000 audit[6479]: CRED_ACQ pid=6479 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:25.826249 kernel: audit: type=1103 audit(1734055645.744:1793): pid=6479 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:25.811000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.848244 kernel: audit: type=1400 audit(1734055645.811:1794): avc: denied { bpf } for pid=6487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.811000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.811000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.811000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.811000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.811000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.811000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.811000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.811000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.811000 audit: BPF prog-id=237 op=LOAD Dec 13 02:07:25.811000 audit[6487]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff7c9754b0 a2=98 a3=ffffffff items=0 ppid=6046 pid=6487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:25.811000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:07:25.851000 audit: BPF prog-id=237 op=UNLOAD Dec 13 02:07:25.851000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.851000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.851000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.851000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.851000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.851000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.851000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.851000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.851000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.851000 audit: BPF prog-id=238 op=LOAD Dec 13 02:07:25.851000 audit[6487]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff7c9752c0 a2=74 a3=540051 items=0 ppid=6046 pid=6487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:25.851000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:07:25.851000 audit: BPF prog-id=238 op=UNLOAD Dec 13 02:07:25.851000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.851000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.851000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.851000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.851000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.851000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.851000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.851000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.851000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.851000 audit: BPF prog-id=239 op=LOAD Dec 13 02:07:25.851000 audit[6487]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff7c9752f0 a2=94 a3=2 items=0 ppid=6046 pid=6487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:25.851000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:07:25.852000 audit: BPF prog-id=239 op=UNLOAD Dec 13 02:07:25.852000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.852000 audit[6487]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff7c9751c0 a2=28 a3=0 items=0 ppid=6046 pid=6487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:25.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:07:25.852000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.852000 audit[6487]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7c9751f0 a2=28 a3=0 items=0 ppid=6046 pid=6487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:25.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:07:25.852000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.852000 audit[6487]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7c975100 a2=28 a3=0 items=0 ppid=6046 pid=6487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:25.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:07:25.852000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.852000 audit[6487]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff7c975210 a2=28 a3=0 items=0 ppid=6046 pid=6487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:25.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:07:25.852000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.852000 audit[6487]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff7c9751f0 a2=28 a3=0 items=0 ppid=6046 pid=6487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:25.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:07:25.852000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.852000 audit[6487]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff7c9751e0 a2=28 a3=0 items=0 ppid=6046 pid=6487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:25.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:07:25.852000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.852000 audit[6487]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff7c975210 a2=28 a3=0 items=0 ppid=6046 pid=6487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:25.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:07:25.852000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.852000 audit[6487]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7c9751f0 a2=28 a3=0 items=0 ppid=6046 pid=6487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:25.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:07:25.853000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.853000 audit[6487]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7c975210 a2=28 a3=0 items=0 ppid=6046 pid=6487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:25.853000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:07:25.853000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.853000 audit[6487]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7c9751e0 a2=28 a3=0 items=0 ppid=6046 pid=6487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:25.853000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:07:25.853000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.853000 audit[6487]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff7c975250 a2=28 a3=0 items=0 ppid=6046 pid=6487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:25.853000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:07:25.853000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.853000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.853000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.853000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.853000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.853000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.853000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.853000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.853000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.853000 audit: BPF prog-id=240 op=LOAD Dec 13 02:07:25.853000 audit[6487]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff7c9750c0 a2=40 a3=0 items=0 ppid=6046 pid=6487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:25.853000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:07:25.853000 audit: BPF prog-id=240 op=UNLOAD Dec 13 02:07:25.854000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.854000 audit[6487]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff7c9750b0 a2=50 a3=2800 items=0 ppid=6046 pid=6487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:25.854000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:07:25.855000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.855000 audit[6487]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fff7c9750b0 a2=50 a3=2800 items=0 ppid=6046 pid=6487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:25.855000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:07:25.855000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.855000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.855000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.855000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.855000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.855000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.855000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.855000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.855000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.855000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.855000 audit: BPF prog-id=241 op=LOAD Dec 13 02:07:25.855000 audit[6487]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff7c9748d0 a2=94 a3=2 items=0 ppid=6046 pid=6487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:25.855000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:07:25.855000 audit: BPF prog-id=241 op=UNLOAD Dec 13 02:07:25.855000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.855000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.855000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.855000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.855000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.855000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.855000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.855000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.855000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.855000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.855000 audit: BPF prog-id=242 op=LOAD Dec 13 02:07:25.855000 audit[6487]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff7c9749d0 a2=94 a3=2d items=0 ppid=6046 pid=6487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:25.855000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:07:25.862000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.862000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.862000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.862000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.862000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.862000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.862000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.862000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.862000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.862000 audit: BPF prog-id=243 op=LOAD Dec 13 02:07:25.862000 audit[6494]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcb1f87660 a2=98 a3=0 items=0 ppid=6046 pid=6494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:25.862000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:07:25.863000 audit: BPF prog-id=243 op=UNLOAD Dec 13 02:07:25.863000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.863000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.863000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.863000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.863000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.863000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.863000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.863000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.863000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.863000 audit: BPF prog-id=244 op=LOAD Dec 13 02:07:25.863000 audit[6494]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcb1f87440 a2=74 a3=540051 items=0 ppid=6046 pid=6494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:25.863000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:07:25.864000 audit: BPF prog-id=244 op=UNLOAD Dec 13 02:07:25.864000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.864000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.864000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.864000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.864000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.864000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.864000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.864000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.864000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:25.864000 audit: BPF prog-id=245 op=LOAD Dec 13 02:07:25.864000 audit[6494]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcb1f87470 a2=94 a3=2 items=0 ppid=6046 pid=6494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:25.864000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:07:25.864000 audit: BPF prog-id=245 op=UNLOAD Dec 13 02:07:26.089442 sshd[6471]: pam_unix(sshd:session): session closed for user core Dec 13 02:07:26.090000 audit[6471]: USER_END pid=6471 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:26.090000 audit[6471]: CRED_DISP pid=6471 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:26.095139 systemd-logind[1221]: Session 26 logged out. Waiting for processes to exit. Dec 13 02:07:26.095000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.128.0.6:22-139.178.68.195:53190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:07:26.096487 systemd[1]: sshd@26-10.128.0.6:22-139.178.68.195:53190.service: Deactivated successfully. Dec 13 02:07:26.097731 systemd[1]: session-26.scope: Deactivated successfully. Dec 13 02:07:26.100486 systemd-logind[1221]: Removed session 26. Dec 13 02:07:26.167000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.167000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.167000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.167000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.167000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.167000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.167000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.167000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.167000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.167000 audit: BPF prog-id=246 op=LOAD Dec 13 02:07:26.167000 audit[6494]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcb1f87330 a2=40 a3=1 items=0 ppid=6046 pid=6494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:26.167000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:07:26.167000 audit: BPF prog-id=246 op=UNLOAD Dec 13 02:07:26.167000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.167000 audit[6494]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffcb1f87400 a2=50 a3=7ffcb1f874e0 items=0 ppid=6046 pid=6494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:26.167000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:07:26.235000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.235000 audit[6494]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcb1f87340 a2=28 a3=0 items=0 ppid=6046 pid=6494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:26.235000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:07:26.235000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.235000 audit[6494]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcb1f87370 a2=28 a3=0 items=0 ppid=6046 pid=6494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:26.235000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:07:26.235000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.235000 audit[6494]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcb1f87280 a2=28 a3=0 items=0 ppid=6046 pid=6494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:26.235000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:07:26.235000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.235000 audit[6494]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcb1f87390 a2=28 a3=0 items=0 ppid=6046 pid=6494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:26.235000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:07:26.235000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.235000 audit[6494]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcb1f87370 a2=28 a3=0 items=0 ppid=6046 pid=6494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:26.235000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:07:26.235000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.235000 audit[6494]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcb1f87360 a2=28 a3=0 items=0 ppid=6046 pid=6494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:26.235000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:07:26.235000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.235000 audit[6494]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcb1f87390 a2=28 a3=0 items=0 ppid=6046 pid=6494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:26.235000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:07:26.235000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.235000 audit[6494]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcb1f87370 a2=28 a3=0 items=0 ppid=6046 pid=6494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:26.235000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:07:26.235000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.235000 audit[6494]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcb1f87390 a2=28 a3=0 items=0 ppid=6046 pid=6494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:26.235000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:07:26.235000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.235000 audit[6494]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcb1f87360 a2=28 a3=0 items=0 ppid=6046 pid=6494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:26.235000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:07:26.235000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.235000 audit[6494]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcb1f873d0 a2=28 a3=0 items=0 ppid=6046 pid=6494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:26.235000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:07:26.235000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.235000 audit[6494]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcb1f87180 a2=50 a3=1 items=0 ppid=6046 pid=6494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:26.235000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:07:26.235000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.235000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.235000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.235000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.235000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.235000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.235000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.235000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.235000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.235000 audit: BPF prog-id=247 op=LOAD Dec 13 02:07:26.235000 audit[6494]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcb1f87180 a2=94 a3=5 items=0 ppid=6046 pid=6494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:26.235000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:07:26.238000 audit: BPF prog-id=247 op=UNLOAD Dec 13 02:07:26.238000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.238000 audit[6494]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcb1f87230 a2=50 a3=1 items=0 ppid=6046 pid=6494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:26.238000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:07:26.238000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.238000 audit[6494]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffcb1f87350 a2=4 a3=38 items=0 ppid=6046 pid=6494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:26.238000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:07:26.238000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.238000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.238000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.238000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.238000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.238000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.238000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.238000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.238000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.238000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.238000 audit[6494]: AVC avc: denied { confidentiality } for pid=6494 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:26.238000 audit[6494]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcb1f873a0 a2=94 a3=6 items=0 ppid=6046 pid=6494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:26.238000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:07:26.238000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.238000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.238000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.238000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.238000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.238000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.238000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.238000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.238000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.238000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.238000 audit[6494]: AVC avc: denied { confidentiality } for pid=6494 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:26.238000 audit[6494]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcb1f86b50 a2=94 a3=83 items=0 ppid=6046 pid=6494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:26.238000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:07:26.239000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.239000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.239000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.239000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.239000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.239000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.239000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.239000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.239000 audit[6494]: AVC avc: denied { perfmon } for pid=6494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.239000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.239000 audit[6494]: AVC avc: denied { confidentiality } for pid=6494 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:07:26.239000 audit[6494]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcb1f86b50 a2=94 a3=83 items=0 ppid=6046 pid=6494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:26.239000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:07:26.241000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.241000 audit[6494]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb1f88590 a2=10 a3=f1f00800 items=0 ppid=6046 pid=6494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:26.241000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:07:26.241000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.241000 audit[6494]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb1f88430 a2=10 a3=3 items=0 ppid=6046 pid=6494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:26.241000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:07:26.241000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.241000 audit[6494]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb1f883d0 a2=10 a3=3 items=0 ppid=6046 pid=6494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:26.241000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:07:26.242000 audit[6494]: AVC avc: denied { bpf } for pid=6494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:07:26.242000 audit[6494]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb1f883d0 a2=10 a3=7 items=0 ppid=6046 pid=6494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:26.242000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:07:26.256000 audit: BPF prog-id=242 op=UNLOAD