Dec 13 02:09:56.113891 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Dec 12 23:50:37 -00 2024 Dec 13 02:09:56.113930 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:09:56.113949 kernel: BIOS-provided physical RAM map: Dec 13 02:09:56.113962 kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] reserved Dec 13 02:09:56.113975 kernel: BIOS-e820: [mem 0x0000000000001000-0x0000000000054fff] usable Dec 13 02:09:56.113988 kernel: BIOS-e820: [mem 0x0000000000055000-0x000000000005ffff] reserved Dec 13 02:09:56.114007 kernel: BIOS-e820: [mem 0x0000000000060000-0x0000000000097fff] usable Dec 13 02:09:56.114022 kernel: BIOS-e820: [mem 0x0000000000098000-0x000000000009ffff] reserved Dec 13 02:09:56.114036 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bd276fff] usable Dec 13 02:09:56.114049 kernel: BIOS-e820: [mem 0x00000000bd277000-0x00000000bd280fff] ACPI data Dec 13 02:09:56.114062 kernel: BIOS-e820: [mem 0x00000000bd281000-0x00000000bf8ecfff] usable Dec 13 02:09:56.114074 kernel: BIOS-e820: [mem 0x00000000bf8ed000-0x00000000bfb6cfff] reserved Dec 13 02:09:56.114086 kernel: BIOS-e820: [mem 0x00000000bfb6d000-0x00000000bfb7efff] ACPI data Dec 13 02:09:56.114099 kernel: BIOS-e820: [mem 0x00000000bfb7f000-0x00000000bfbfefff] ACPI NVS Dec 13 02:09:56.114120 kernel: BIOS-e820: [mem 0x00000000bfbff000-0x00000000bffdffff] usable Dec 13 02:09:56.114134 kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved Dec 13 02:09:56.114147 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable Dec 13 02:09:56.114161 kernel: NX (Execute Disable) protection: active Dec 13 02:09:56.114174 kernel: efi: EFI v2.70 by EDK II Dec 13 02:09:56.114189 kernel: efi: TPMFinalLog=0xbfbf7000 ACPI=0xbfb7e000 ACPI 2.0=0xbfb7e014 SMBIOS=0xbf9e8000 RNG=0xbfb73018 TPMEventLog=0xbd277018 Dec 13 02:09:56.114203 kernel: random: crng init done Dec 13 02:09:56.114217 kernel: SMBIOS 2.4 present. Dec 13 02:09:56.114235 kernel: DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Dec 13 02:09:56.114249 kernel: Hypervisor detected: KVM Dec 13 02:09:56.114263 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 02:09:56.114276 kernel: kvm-clock: cpu 0, msr 16b19b001, primary cpu clock Dec 13 02:09:56.114289 kernel: kvm-clock: using sched offset of 13027252167 cycles Dec 13 02:09:56.114304 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 02:09:56.114320 kernel: tsc: Detected 2299.998 MHz processor Dec 13 02:09:56.114335 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 02:09:56.114351 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 02:09:56.114366 kernel: last_pfn = 0x220000 max_arch_pfn = 0x400000000 Dec 13 02:09:56.114394 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 02:09:56.114409 kernel: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 Dec 13 02:09:56.114424 kernel: Using GB pages for direct mapping Dec 13 02:09:56.114439 kernel: Secure boot disabled Dec 13 02:09:56.114455 kernel: ACPI: Early table checksum verification disabled Dec 13 02:09:56.114468 kernel: ACPI: RSDP 0x00000000BFB7E014 000024 (v02 Google) Dec 13 02:09:56.114484 kernel: ACPI: XSDT 0x00000000BFB7D0E8 00005C (v01 Google GOOGFACP 00000001 01000013) Dec 13 02:09:56.114500 kernel: ACPI: FACP 0x00000000BFB78000 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) Dec 13 02:09:56.114526 kernel: ACPI: DSDT 0x00000000BFB79000 001A64 (v01 Google GOOGDSDT 00000001 GOOG 00000001) Dec 13 02:09:56.114542 kernel: ACPI: FACS 0x00000000BFBF2000 000040 Dec 13 02:09:56.114573 kernel: ACPI: SSDT 0x00000000BFB7C000 000316 (v02 GOOGLE Tpm2Tabl 00001000 INTL 20240322) Dec 13 02:09:56.114588 kernel: ACPI: TPM2 0x00000000BFB7B000 000034 (v04 GOOGLE 00000001 GOOG 00000001) Dec 13 02:09:56.114604 kernel: ACPI: SRAT 0x00000000BFB77000 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) Dec 13 02:09:56.114619 kernel: ACPI: APIC 0x00000000BFB76000 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) Dec 13 02:09:56.114639 kernel: ACPI: SSDT 0x00000000BFB75000 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) Dec 13 02:09:56.114653 kernel: ACPI: WAET 0x00000000BFB74000 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) Dec 13 02:09:56.114669 kernel: ACPI: Reserving FACP table memory at [mem 0xbfb78000-0xbfb780f3] Dec 13 02:09:56.114685 kernel: ACPI: Reserving DSDT table memory at [mem 0xbfb79000-0xbfb7aa63] Dec 13 02:09:56.114700 kernel: ACPI: Reserving FACS table memory at [mem 0xbfbf2000-0xbfbf203f] Dec 13 02:09:56.114716 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb7c000-0xbfb7c315] Dec 13 02:09:56.114732 kernel: ACPI: Reserving TPM2 table memory at [mem 0xbfb7b000-0xbfb7b033] Dec 13 02:09:56.114748 kernel: ACPI: Reserving SRAT table memory at [mem 0xbfb77000-0xbfb770c7] Dec 13 02:09:56.114764 kernel: ACPI: Reserving APIC table memory at [mem 0xbfb76000-0xbfb76075] Dec 13 02:09:56.114784 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb75000-0xbfb7597f] Dec 13 02:09:56.114800 kernel: ACPI: Reserving WAET table memory at [mem 0xbfb74000-0xbfb74027] Dec 13 02:09:56.114815 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 02:09:56.114830 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Dec 13 02:09:56.114844 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Dec 13 02:09:56.114916 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] Dec 13 02:09:56.114933 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] Dec 13 02:09:56.114950 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] Dec 13 02:09:56.114966 kernel: NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] Dec 13 02:09:56.114988 kernel: NODE_DATA(0) allocated [mem 0x21fffa000-0x21fffffff] Dec 13 02:09:56.115005 kernel: Zone ranges: Dec 13 02:09:56.115022 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 02:09:56.115039 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Dec 13 02:09:56.115055 kernel: Normal [mem 0x0000000100000000-0x000000021fffffff] Dec 13 02:09:56.115071 kernel: Movable zone start for each node Dec 13 02:09:56.115087 kernel: Early memory node ranges Dec 13 02:09:56.115107 kernel: node 0: [mem 0x0000000000001000-0x0000000000054fff] Dec 13 02:09:56.115123 kernel: node 0: [mem 0x0000000000060000-0x0000000000097fff] Dec 13 02:09:56.115143 kernel: node 0: [mem 0x0000000000100000-0x00000000bd276fff] Dec 13 02:09:56.115160 kernel: node 0: [mem 0x00000000bd281000-0x00000000bf8ecfff] Dec 13 02:09:56.115176 kernel: node 0: [mem 0x00000000bfbff000-0x00000000bffdffff] Dec 13 02:09:56.115192 kernel: node 0: [mem 0x0000000100000000-0x000000021fffffff] Dec 13 02:09:56.115209 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] Dec 13 02:09:56.115225 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 02:09:56.115242 kernel: On node 0, zone DMA: 11 pages in unavailable ranges Dec 13 02:09:56.115258 kernel: On node 0, zone DMA: 104 pages in unavailable ranges Dec 13 02:09:56.115278 kernel: On node 0, zone DMA32: 10 pages in unavailable ranges Dec 13 02:09:56.115299 kernel: On node 0, zone DMA32: 786 pages in unavailable ranges Dec 13 02:09:56.115315 kernel: On node 0, zone Normal: 32 pages in unavailable ranges Dec 13 02:09:56.115332 kernel: ACPI: PM-Timer IO Port: 0xb008 Dec 13 02:09:56.115348 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 02:09:56.115365 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 13 02:09:56.115388 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 02:09:56.115405 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 02:09:56.115421 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 02:09:56.115437 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 02:09:56.115456 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 02:09:56.115472 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Dec 13 02:09:56.115488 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Dec 13 02:09:56.115504 kernel: Booting paravirtualized kernel on KVM Dec 13 02:09:56.115521 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 02:09:56.115538 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Dec 13 02:09:56.115555 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Dec 13 02:09:56.115585 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Dec 13 02:09:56.115601 kernel: pcpu-alloc: [0] 0 1 Dec 13 02:09:56.115621 kernel: kvm-guest: PV spinlocks enabled Dec 13 02:09:56.115638 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 02:09:56.115653 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1932270 Dec 13 02:09:56.115669 kernel: Policy zone: Normal Dec 13 02:09:56.115688 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:09:56.115705 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 02:09:56.115722 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Dec 13 02:09:56.115738 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 02:09:56.115755 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 02:09:56.115776 kernel: Memory: 7515408K/7860544K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47476K init, 4108K bss, 344876K reserved, 0K cma-reserved) Dec 13 02:09:56.115793 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 02:09:56.115810 kernel: Kernel/User page tables isolation: enabled Dec 13 02:09:56.115826 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 02:09:56.115841 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 02:09:56.115857 kernel: rcu: Hierarchical RCU implementation. Dec 13 02:09:56.115874 kernel: rcu: RCU event tracing is enabled. Dec 13 02:09:56.115891 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 02:09:56.115912 kernel: Rude variant of Tasks RCU enabled. Dec 13 02:09:56.115942 kernel: Tracing variant of Tasks RCU enabled. Dec 13 02:09:56.115960 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 02:09:56.115981 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 02:09:56.116002 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Dec 13 02:09:56.116019 kernel: Console: colour dummy device 80x25 Dec 13 02:09:56.116036 kernel: printk: console [ttyS0] enabled Dec 13 02:09:56.116054 kernel: ACPI: Core revision 20210730 Dec 13 02:09:56.116071 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 02:09:56.116089 kernel: x2apic enabled Dec 13 02:09:56.116110 kernel: Switched APIC routing to physical x2apic. Dec 13 02:09:56.116127 kernel: ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 Dec 13 02:09:56.116145 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Dec 13 02:09:56.116162 kernel: Calibrating delay loop (skipped) preset value.. 4599.99 BogoMIPS (lpj=2299998) Dec 13 02:09:56.116178 kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 Dec 13 02:09:56.116194 kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 Dec 13 02:09:56.116212 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 02:09:56.116233 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Dec 13 02:09:56.116251 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Dec 13 02:09:56.116268 kernel: Spectre V2 : Mitigation: IBRS Dec 13 02:09:56.116286 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 02:09:56.116304 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 02:09:56.116322 kernel: RETBleed: Mitigation: IBRS Dec 13 02:09:56.116340 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 02:09:56.116358 kernel: Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl Dec 13 02:09:56.116384 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 02:09:56.116406 kernel: MDS: Mitigation: Clear CPU buffers Dec 13 02:09:56.116424 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 02:09:56.116441 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 02:09:56.116459 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 02:09:56.116476 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 02:09:56.116493 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 02:09:56.116511 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Dec 13 02:09:56.116529 kernel: Freeing SMP alternatives memory: 32K Dec 13 02:09:56.116546 kernel: pid_max: default: 32768 minimum: 301 Dec 13 02:09:56.116588 kernel: LSM: Security Framework initializing Dec 13 02:09:56.116606 kernel: SELinux: Initializing. Dec 13 02:09:56.116623 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 02:09:56.116640 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 02:09:56.116657 kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) Dec 13 02:09:56.116675 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Dec 13 02:09:56.116692 kernel: signal: max sigframe size: 1776 Dec 13 02:09:56.116710 kernel: rcu: Hierarchical SRCU implementation. Dec 13 02:09:56.116729 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 02:09:56.116751 kernel: smp: Bringing up secondary CPUs ... Dec 13 02:09:56.116768 kernel: x86: Booting SMP configuration: Dec 13 02:09:56.116786 kernel: .... node #0, CPUs: #1 Dec 13 02:09:56.116804 kernel: kvm-clock: cpu 1, msr 16b19b041, secondary cpu clock Dec 13 02:09:56.116822 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Dec 13 02:09:56.116841 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Dec 13 02:09:56.116858 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 02:09:56.116875 kernel: smpboot: Max logical packages: 1 Dec 13 02:09:56.116898 kernel: smpboot: Total of 2 processors activated (9199.99 BogoMIPS) Dec 13 02:09:56.116915 kernel: devtmpfs: initialized Dec 13 02:09:56.116933 kernel: x86/mm: Memory block size: 128MB Dec 13 02:09:56.116950 kernel: ACPI: PM: Registering ACPI NVS region [mem 0xbfb7f000-0xbfbfefff] (524288 bytes) Dec 13 02:09:56.116968 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 02:09:56.116986 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 02:09:56.117003 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 02:09:56.117021 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 02:09:56.117039 kernel: audit: initializing netlink subsys (disabled) Dec 13 02:09:56.117061 kernel: audit: type=2000 audit(1734055794.780:1): state=initialized audit_enabled=0 res=1 Dec 13 02:09:56.117078 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 02:09:56.117095 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 02:09:56.117112 kernel: cpuidle: using governor menu Dec 13 02:09:56.117129 kernel: ACPI: bus type PCI registered Dec 13 02:09:56.117147 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 02:09:56.117164 kernel: dca service started, version 1.12.1 Dec 13 02:09:56.117182 kernel: PCI: Using configuration type 1 for base access Dec 13 02:09:56.117200 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 02:09:56.117221 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 02:09:56.117239 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 02:09:56.117256 kernel: ACPI: Added _OSI(Module Device) Dec 13 02:09:56.117274 kernel: ACPI: Added _OSI(Processor Device) Dec 13 02:09:56.117292 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 02:09:56.117310 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 02:09:56.117327 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 02:09:56.117345 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 02:09:56.117362 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 02:09:56.117392 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Dec 13 02:09:56.117410 kernel: ACPI: Interpreter enabled Dec 13 02:09:56.117427 kernel: ACPI: PM: (supports S0 S3 S5) Dec 13 02:09:56.117445 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 02:09:56.117463 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 02:09:56.117480 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Dec 13 02:09:56.117496 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 02:09:56.117742 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Dec 13 02:09:56.117927 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Dec 13 02:09:56.117951 kernel: PCI host bridge to bus 0000:00 Dec 13 02:09:56.118120 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 02:09:56.118272 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 02:09:56.118440 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 02:09:56.118657 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] Dec 13 02:09:56.118804 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 02:09:56.118981 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Dec 13 02:09:56.128813 kernel: pci 0000:00:01.0: [8086:7110] type 00 class 0x060100 Dec 13 02:09:56.129026 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Dec 13 02:09:56.129204 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Dec 13 02:09:56.129377 kernel: pci 0000:00:03.0: [1af4:1004] type 00 class 0x000000 Dec 13 02:09:56.129576 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] Dec 13 02:09:56.129760 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc0001000-0xc000107f] Dec 13 02:09:56.129953 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Dec 13 02:09:56.130136 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] Dec 13 02:09:56.130305 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc0000000-0xc000007f] Dec 13 02:09:56.130481 kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 Dec 13 02:09:56.133891 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Dec 13 02:09:56.134118 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc0002000-0xc000203f] Dec 13 02:09:56.134151 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 02:09:56.134170 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 02:09:56.134187 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 02:09:56.134205 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 02:09:56.134223 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Dec 13 02:09:56.134240 kernel: iommu: Default domain type: Translated Dec 13 02:09:56.134257 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 02:09:56.134274 kernel: vgaarb: loaded Dec 13 02:09:56.134291 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 02:09:56.134313 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 02:09:56.134330 kernel: PTP clock support registered Dec 13 02:09:56.134346 kernel: Registered efivars operations Dec 13 02:09:56.134362 kernel: PCI: Using ACPI for IRQ routing Dec 13 02:09:56.134377 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 02:09:56.134393 kernel: e820: reserve RAM buffer [mem 0x00055000-0x0005ffff] Dec 13 02:09:56.134408 kernel: e820: reserve RAM buffer [mem 0x00098000-0x0009ffff] Dec 13 02:09:56.134424 kernel: e820: reserve RAM buffer [mem 0xbd277000-0xbfffffff] Dec 13 02:09:56.134440 kernel: e820: reserve RAM buffer [mem 0xbf8ed000-0xbfffffff] Dec 13 02:09:56.134459 kernel: e820: reserve RAM buffer [mem 0xbffe0000-0xbfffffff] Dec 13 02:09:56.134475 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 02:09:56.134491 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 02:09:56.134508 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 02:09:56.134524 kernel: pnp: PnP ACPI init Dec 13 02:09:56.134541 kernel: pnp: PnP ACPI: found 7 devices Dec 13 02:09:56.134710 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 02:09:56.134735 kernel: NET: Registered PF_INET protocol family Dec 13 02:09:56.134753 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 02:09:56.134776 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Dec 13 02:09:56.134793 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 02:09:56.134810 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 02:09:56.134826 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Dec 13 02:09:56.134845 kernel: TCP: Hash tables configured (established 65536 bind 65536) Dec 13 02:09:56.134862 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 13 02:09:56.134881 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 13 02:09:56.134918 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 02:09:56.134939 kernel: NET: Registered PF_XDP protocol family Dec 13 02:09:56.135141 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 02:09:56.135295 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 02:09:56.135447 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 02:09:56.135613 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfefff window] Dec 13 02:09:56.135783 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Dec 13 02:09:56.135806 kernel: PCI: CLS 0 bytes, default 64 Dec 13 02:09:56.135828 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Dec 13 02:09:56.135844 kernel: software IO TLB: mapped [mem 0x00000000b7f7f000-0x00000000bbf7f000] (64MB) Dec 13 02:09:56.135861 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 02:09:56.135877 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Dec 13 02:09:56.135894 kernel: clocksource: Switched to clocksource tsc Dec 13 02:09:56.135910 kernel: Initialise system trusted keyrings Dec 13 02:09:56.135926 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Dec 13 02:09:56.135943 kernel: Key type asymmetric registered Dec 13 02:09:56.135959 kernel: Asymmetric key parser 'x509' registered Dec 13 02:09:56.135979 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 02:09:56.135996 kernel: io scheduler mq-deadline registered Dec 13 02:09:56.136012 kernel: io scheduler kyber registered Dec 13 02:09:56.136029 kernel: io scheduler bfq registered Dec 13 02:09:56.136045 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 02:09:56.136064 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Dec 13 02:09:56.136242 kernel: virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver Dec 13 02:09:56.136265 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Dec 13 02:09:56.136427 kernel: virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver Dec 13 02:09:56.136454 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Dec 13 02:09:56.151441 kernel: virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver Dec 13 02:09:56.151487 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 02:09:56.151507 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 02:09:56.151526 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Dec 13 02:09:56.151543 kernel: 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A Dec 13 02:09:56.151579 kernel: 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A Dec 13 02:09:56.151777 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x9009, rev-id 0) Dec 13 02:09:56.151813 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 02:09:56.151830 kernel: i8042: Warning: Keylock active Dec 13 02:09:56.151847 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 02:09:56.151864 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 02:09:56.152039 kernel: rtc_cmos 00:00: RTC can wake from S4 Dec 13 02:09:56.152195 kernel: rtc_cmos 00:00: registered as rtc0 Dec 13 02:09:56.152358 kernel: rtc_cmos 00:00: setting system clock to 2024-12-13T02:09:55 UTC (1734055795) Dec 13 02:09:56.152508 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Dec 13 02:09:56.152535 kernel: intel_pstate: CPU model not supported Dec 13 02:09:56.152554 kernel: pstore: Registered efi as persistent store backend Dec 13 02:09:56.160643 kernel: NET: Registered PF_INET6 protocol family Dec 13 02:09:56.160664 kernel: Segment Routing with IPv6 Dec 13 02:09:56.160682 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 02:09:56.160699 kernel: NET: Registered PF_PACKET protocol family Dec 13 02:09:56.160715 kernel: Key type dns_resolver registered Dec 13 02:09:56.160734 kernel: IPI shorthand broadcast: enabled Dec 13 02:09:56.160751 kernel: sched_clock: Marking stable (748501101, 166904807)->(961521230, -46115322) Dec 13 02:09:56.160776 kernel: registered taskstats version 1 Dec 13 02:09:56.160794 kernel: Loading compiled-in X.509 certificates Dec 13 02:09:56.160811 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 02:09:56.160828 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: d9defb0205602bee9bb670636cbe5c74194fdb5e' Dec 13 02:09:56.160846 kernel: Key type .fscrypt registered Dec 13 02:09:56.160863 kernel: Key type fscrypt-provisioning registered Dec 13 02:09:56.160881 kernel: pstore: Using crash dump compression: deflate Dec 13 02:09:56.160899 kernel: ima: Allocated hash algorithm: sha1 Dec 13 02:09:56.160916 kernel: ima: No architecture policies found Dec 13 02:09:56.160938 kernel: clk: Disabling unused clocks Dec 13 02:09:56.160956 kernel: Freeing unused kernel image (initmem) memory: 47476K Dec 13 02:09:56.160973 kernel: Write protecting the kernel read-only data: 28672k Dec 13 02:09:56.160991 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 02:09:56.161009 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 02:09:56.161026 kernel: Run /init as init process Dec 13 02:09:56.161044 kernel: with arguments: Dec 13 02:09:56.161061 kernel: /init Dec 13 02:09:56.161078 kernel: with environment: Dec 13 02:09:56.161098 kernel: HOME=/ Dec 13 02:09:56.161116 kernel: TERM=linux Dec 13 02:09:56.161133 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 02:09:56.161156 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 02:09:56.161177 systemd[1]: Detected virtualization kvm. Dec 13 02:09:56.161196 systemd[1]: Detected architecture x86-64. Dec 13 02:09:56.161214 systemd[1]: Running in initrd. Dec 13 02:09:56.161235 systemd[1]: No hostname configured, using default hostname. Dec 13 02:09:56.161253 systemd[1]: Hostname set to . Dec 13 02:09:56.161272 systemd[1]: Initializing machine ID from VM UUID. Dec 13 02:09:56.161291 systemd[1]: Queued start job for default target initrd.target. Dec 13 02:09:56.161319 systemd[1]: Started systemd-ask-password-console.path. Dec 13 02:09:56.161337 systemd[1]: Reached target cryptsetup.target. Dec 13 02:09:56.161354 systemd[1]: Reached target paths.target. Dec 13 02:09:56.161372 systemd[1]: Reached target slices.target. Dec 13 02:09:56.161394 systemd[1]: Reached target swap.target. Dec 13 02:09:56.161413 systemd[1]: Reached target timers.target. Dec 13 02:09:56.161432 systemd[1]: Listening on iscsid.socket. Dec 13 02:09:56.161451 systemd[1]: Listening on iscsiuio.socket. Dec 13 02:09:56.161469 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 02:09:56.161488 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 02:09:56.161506 systemd[1]: Listening on systemd-journald.socket. Dec 13 02:09:56.161524 systemd[1]: Listening on systemd-networkd.socket. Dec 13 02:09:56.161546 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 02:09:56.171708 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 02:09:56.171766 systemd[1]: Reached target sockets.target. Dec 13 02:09:56.171789 systemd[1]: Starting kmod-static-nodes.service... Dec 13 02:09:56.171806 systemd[1]: Finished network-cleanup.service. Dec 13 02:09:56.171825 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 02:09:56.171847 systemd[1]: Starting systemd-journald.service... Dec 13 02:09:56.171864 systemd[1]: Starting systemd-modules-load.service... Dec 13 02:09:56.171882 systemd[1]: Starting systemd-resolved.service... Dec 13 02:09:56.171901 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 02:09:56.171920 systemd[1]: Finished kmod-static-nodes.service. Dec 13 02:09:56.171939 kernel: audit: type=1130 audit(1734055796.143:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:09:56.171960 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 02:09:56.171979 kernel: audit: type=1130 audit(1734055796.151:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:09:56.171998 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 02:09:56.172022 kernel: audit: type=1130 audit(1734055796.160:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:09:56.172041 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 02:09:56.172065 systemd-journald[190]: Journal started Dec 13 02:09:56.172162 systemd-journald[190]: Runtime Journal (/run/log/journal/eef2b9a12848785ed764b28cf6ab639e) is 8.0M, max 148.8M, 140.8M free. Dec 13 02:09:56.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:09:56.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:09:56.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:09:56.131060 systemd-modules-load[191]: Inserted module 'overlay' Dec 13 02:09:56.184494 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 02:09:56.191588 systemd[1]: Started systemd-journald.service. Dec 13 02:09:56.202585 kernel: audit: type=1130 audit(1734055796.194:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:09:56.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:09:56.207591 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 02:09:56.210127 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 02:09:56.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:09:56.216590 kernel: audit: type=1130 audit(1734055796.209:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:09:56.218179 systemd-modules-load[191]: Inserted module 'br_netfilter' Dec 13 02:09:56.218699 kernel: Bridge firewalling registered Dec 13 02:09:56.223769 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 02:09:56.227269 systemd[1]: Starting dracut-cmdline.service... Dec 13 02:09:56.238689 kernel: audit: type=1130 audit(1734055796.224:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:09:56.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:09:56.255388 systemd-resolved[192]: Positive Trust Anchors: Dec 13 02:09:56.255909 systemd-resolved[192]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 02:09:56.255988 systemd-resolved[192]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 02:09:56.272718 kernel: SCSI subsystem initialized Dec 13 02:09:56.262519 systemd-resolved[192]: Defaulting to hostname 'linux'. Dec 13 02:09:56.276697 dracut-cmdline[205]: dracut-dracut-053 Dec 13 02:09:56.276697 dracut-cmdline[205]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:09:56.264245 systemd[1]: Started systemd-resolved.service. Dec 13 02:09:56.295809 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 02:09:56.295847 kernel: device-mapper: uevent: version 1.0.3 Dec 13 02:09:56.295870 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 02:09:56.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:09:56.300829 systemd[1]: Reached target nss-lookup.target. Dec 13 02:09:56.316709 kernel: audit: type=1130 audit(1734055796.299:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:09:56.316752 kernel: audit: type=1130 audit(1734055796.308:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:09:56.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:09:56.304682 systemd-modules-load[191]: Inserted module 'dm_multipath' Dec 13 02:09:56.306397 systemd[1]: Finished systemd-modules-load.service. Dec 13 02:09:56.313934 systemd[1]: Starting systemd-sysctl.service... Dec 13 02:09:56.335151 systemd[1]: Finished systemd-sysctl.service. Dec 13 02:09:56.347738 kernel: audit: type=1130 audit(1734055796.338:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:09:56.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:09:56.375600 kernel: Loading iSCSI transport class v2.0-870. Dec 13 02:09:56.396700 kernel: iscsi: registered transport (tcp) Dec 13 02:09:56.423644 kernel: iscsi: registered transport (qla4xxx) Dec 13 02:09:56.423728 kernel: QLogic iSCSI HBA Driver Dec 13 02:09:56.469216 systemd[1]: Finished dracut-cmdline.service. Dec 13 02:09:56.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:09:56.471155 systemd[1]: Starting dracut-pre-udev.service... Dec 13 02:09:56.530646 kernel: raid6: avx2x4 gen() 17813 MB/s Dec 13 02:09:56.547642 kernel: raid6: avx2x4 xor() 7553 MB/s Dec 13 02:09:56.564647 kernel: raid6: avx2x2 gen() 17768 MB/s Dec 13 02:09:56.582649 kernel: raid6: avx2x2 xor() 18385 MB/s Dec 13 02:09:56.599646 kernel: raid6: avx2x1 gen() 13650 MB/s Dec 13 02:09:56.617645 kernel: raid6: avx2x1 xor() 16007 MB/s Dec 13 02:09:56.635648 kernel: raid6: sse2x4 gen() 10876 MB/s Dec 13 02:09:56.652649 kernel: raid6: sse2x4 xor() 6598 MB/s Dec 13 02:09:56.670653 kernel: raid6: sse2x2 gen() 11730 MB/s Dec 13 02:09:56.687627 kernel: raid6: sse2x2 xor() 7322 MB/s Dec 13 02:09:56.704612 kernel: raid6: sse2x1 gen() 10497 MB/s Dec 13 02:09:56.722867 kernel: raid6: sse2x1 xor() 5124 MB/s Dec 13 02:09:56.722951 kernel: raid6: using algorithm avx2x4 gen() 17813 MB/s Dec 13 02:09:56.722975 kernel: raid6: .... xor() 7553 MB/s, rmw enabled Dec 13 02:09:56.723811 kernel: raid6: using avx2x2 recovery algorithm Dec 13 02:09:56.739602 kernel: xor: automatically using best checksumming function avx Dec 13 02:09:56.846611 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 02:09:56.858186 systemd[1]: Finished dracut-pre-udev.service. Dec 13 02:09:56.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:09:56.858000 audit: BPF prog-id=7 op=LOAD Dec 13 02:09:56.858000 audit: BPF prog-id=8 op=LOAD Dec 13 02:09:56.860756 systemd[1]: Starting systemd-udevd.service... Dec 13 02:09:56.877912 systemd-udevd[387]: Using default interface naming scheme 'v252'. Dec 13 02:09:56.885166 systemd[1]: Started systemd-udevd.service. Dec 13 02:09:56.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:09:56.888778 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 02:09:56.908825 dracut-pre-trigger[390]: rd.md=0: removing MD RAID activation Dec 13 02:09:56.946959 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 02:09:56.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:09:56.952697 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 02:09:57.019109 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 02:09:57.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:09:57.097603 kernel: scsi host0: Virtio SCSI HBA Dec 13 02:09:57.110589 kernel: scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 Dec 13 02:09:57.116687 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 02:09:57.184431 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 02:09:57.184513 kernel: AES CTR mode by8 optimization enabled Dec 13 02:09:57.253005 kernel: sd 0:0:1:0: [sda] 25165824 512-byte logical blocks: (12.9 GB/12.0 GiB) Dec 13 02:09:57.313167 kernel: sd 0:0:1:0: [sda] 4096-byte physical blocks Dec 13 02:09:57.313445 kernel: sd 0:0:1:0: [sda] Write Protect is off Dec 13 02:09:57.313681 kernel: sd 0:0:1:0: [sda] Mode Sense: 1f 00 00 08 Dec 13 02:09:57.313885 kernel: sd 0:0:1:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Dec 13 02:09:57.314088 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 02:09:57.314121 kernel: GPT:17805311 != 25165823 Dec 13 02:09:57.314143 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 02:09:57.314166 kernel: GPT:17805311 != 25165823 Dec 13 02:09:57.314187 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 02:09:57.314209 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 02:09:57.314231 kernel: sd 0:0:1:0: [sda] Attached SCSI disk Dec 13 02:09:57.370290 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 02:09:57.388939 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by (udev-worker) (429) Dec 13 02:09:57.388737 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 02:09:57.414698 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 02:09:57.434708 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 02:09:57.463251 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 02:09:57.472942 systemd[1]: Starting disk-uuid.service... Dec 13 02:09:57.493865 disk-uuid[506]: Primary Header is updated. Dec 13 02:09:57.493865 disk-uuid[506]: Secondary Entries is updated. Dec 13 02:09:57.493865 disk-uuid[506]: Secondary Header is updated. Dec 13 02:09:57.522263 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 02:09:57.522304 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 02:09:57.545591 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 02:09:58.556605 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 02:09:58.556781 disk-uuid[507]: The operation has completed successfully. Dec 13 02:09:58.624895 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 02:09:58.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:09:58.623000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:09:58.625035 systemd[1]: Finished disk-uuid.service. Dec 13 02:09:58.636615 systemd[1]: Starting verity-setup.service... Dec 13 02:09:58.665753 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 02:09:58.747303 systemd[1]: Found device dev-mapper-usr.device. Dec 13 02:09:58.749970 systemd[1]: Mounting sysusr-usr.mount... Dec 13 02:09:58.773288 systemd[1]: Finished verity-setup.service. Dec 13 02:09:58.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:09:58.853609 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 02:09:58.854235 systemd[1]: Mounted sysusr-usr.mount. Dec 13 02:09:58.854667 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 02:09:58.899773 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 02:09:58.899806 kernel: BTRFS info (device sda6): using free space tree Dec 13 02:09:58.899821 kernel: BTRFS info (device sda6): has skinny extents Dec 13 02:09:58.855652 systemd[1]: Starting ignition-setup.service... Dec 13 02:09:58.912750 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 02:09:58.920994 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 02:09:58.944225 systemd[1]: Finished ignition-setup.service. Dec 13 02:09:58.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:09:58.945951 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 02:09:59.037465 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 02:09:59.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:09:59.037000 audit: BPF prog-id=9 op=LOAD Dec 13 02:09:59.039546 systemd[1]: Starting systemd-networkd.service... Dec 13 02:09:59.073396 systemd-networkd[683]: lo: Link UP Dec 13 02:09:59.073411 systemd-networkd[683]: lo: Gained carrier Dec 13 02:09:59.074652 systemd-networkd[683]: Enumeration completed Dec 13 02:09:59.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:09:59.074984 systemd[1]: Started systemd-networkd.service. Dec 13 02:09:59.075051 systemd-networkd[683]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 02:09:59.077610 systemd-networkd[683]: eth0: Link UP Dec 13 02:09:59.077618 systemd-networkd[683]: eth0: Gained carrier Dec 13 02:09:59.089727 systemd-networkd[683]: eth0: DHCPv4 address 10.128.0.74/32, gateway 10.128.0.1 acquired from 169.254.169.254 Dec 13 02:09:59.095943 systemd[1]: Reached target network.target. Dec 13 02:09:59.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:09:59.111975 systemd[1]: Starting iscsiuio.service... Dec 13 02:09:59.182763 iscsid[693]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 02:09:59.182763 iscsid[693]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Dec 13 02:09:59.182763 iscsid[693]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 02:09:59.182763 iscsid[693]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 02:09:59.182763 iscsid[693]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 02:09:59.182763 iscsid[693]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 02:09:59.182763 iscsid[693]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 02:09:59.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:09:59.137203 systemd[1]: Started iscsiuio.service. Dec 13 02:09:59.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:09:59.254303 ignition[588]: Ignition 2.14.0 Dec 13 02:09:59.168636 systemd[1]: Starting iscsid.service... Dec 13 02:09:59.254318 ignition[588]: Stage: fetch-offline Dec 13 02:09:59.251057 systemd[1]: Started iscsid.service. Dec 13 02:09:59.254392 ignition[588]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:09:59.288213 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 02:09:59.371000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:09:59.254430 ignition[588]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 02:09:59.310389 systemd[1]: Starting dracut-initqueue.service... Dec 13 02:09:59.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:09:59.270260 ignition[588]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 02:09:59.330007 systemd[1]: Starting ignition-fetch.service... Dec 13 02:09:59.270474 ignition[588]: parsed url from cmdline: "" Dec 13 02:09:59.336248 systemd[1]: Finished dracut-initqueue.service. Dec 13 02:09:59.270481 ignition[588]: no config URL provided Dec 13 02:09:59.366370 unknown[702]: fetched base config from "system" Dec 13 02:09:59.270488 ignition[588]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 02:09:59.366383 unknown[702]: fetched base config from "system" Dec 13 02:09:59.270499 ignition[588]: no config at "/usr/lib/ignition/user.ign" Dec 13 02:09:59.366394 unknown[702]: fetched user config from "gcp" Dec 13 02:09:59.270510 ignition[588]: failed to fetch config: resource requires networking Dec 13 02:09:59.373226 systemd[1]: Finished ignition-fetch.service. Dec 13 02:09:59.270694 ignition[588]: Ignition finished successfully Dec 13 02:09:59.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:09:59.389126 systemd[1]: Reached target remote-fs-pre.target. Dec 13 02:09:59.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:09:59.342380 ignition[702]: Ignition 2.14.0 Dec 13 02:09:59.404814 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 02:09:59.342391 ignition[702]: Stage: fetch Dec 13 02:09:59.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:09:59.428866 systemd[1]: Reached target remote-fs.target. Dec 13 02:09:59.342514 ignition[702]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:09:59.449952 systemd[1]: Starting dracut-pre-mount.service... Dec 13 02:09:59.342548 ignition[702]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 02:09:59.473904 systemd[1]: Starting ignition-kargs.service... Dec 13 02:09:59.350392 ignition[702]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 02:09:59.513268 systemd[1]: Finished dracut-pre-mount.service. Dec 13 02:09:59.350620 ignition[702]: parsed url from cmdline: "" Dec 13 02:09:59.520199 systemd[1]: Finished ignition-kargs.service. Dec 13 02:09:59.350626 ignition[702]: no config URL provided Dec 13 02:09:59.543161 systemd[1]: Starting ignition-disks.service... Dec 13 02:09:59.350634 ignition[702]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 02:09:59.565208 systemd[1]: Finished ignition-disks.service. Dec 13 02:09:59.350645 ignition[702]: no config at "/usr/lib/ignition/user.ign" Dec 13 02:09:59.572075 systemd[1]: Reached target initrd-root-device.target. Dec 13 02:09:59.350684 ignition[702]: GET http://169.254.169.254/computeMetadata/v1/instance/attributes/user-data: attempt #1 Dec 13 02:09:59.590761 systemd[1]: Reached target local-fs-pre.target. Dec 13 02:09:59.361783 ignition[702]: GET result: OK Dec 13 02:09:59.604759 systemd[1]: Reached target local-fs.target. Dec 13 02:09:59.361900 ignition[702]: parsing config with SHA512: 33d4b49b849c7595714aa5fc5f7d5c4f9a5e6f3a5a9ac8a80ed212dcae8499d79f9fcb4c7804bde4b28aff04709927ba1a71f248935f9c4d6776fefd0984be5b Dec 13 02:09:59.619760 systemd[1]: Reached target sysinit.target. Dec 13 02:09:59.369652 ignition[702]: fetch: fetch complete Dec 13 02:09:59.633804 systemd[1]: Reached target basic.target. Dec 13 02:09:59.369664 ignition[702]: fetch: fetch passed Dec 13 02:09:59.648132 systemd[1]: Starting systemd-fsck-root.service... Dec 13 02:09:59.369745 ignition[702]: Ignition finished successfully Dec 13 02:09:59.487821 ignition[713]: Ignition 2.14.0 Dec 13 02:09:59.487830 ignition[713]: Stage: kargs Dec 13 02:09:59.487963 ignition[713]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:09:59.488000 ignition[713]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 02:09:59.497337 ignition[713]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 02:09:59.498721 ignition[713]: kargs: kargs passed Dec 13 02:09:59.498793 ignition[713]: Ignition finished successfully Dec 13 02:09:59.555115 ignition[719]: Ignition 2.14.0 Dec 13 02:09:59.555126 ignition[719]: Stage: disks Dec 13 02:09:59.555271 ignition[719]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:09:59.555301 ignition[719]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 02:09:59.562621 ignition[719]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 02:09:59.564082 ignition[719]: disks: disks passed Dec 13 02:09:59.564135 ignition[719]: Ignition finished successfully Dec 13 02:09:59.685126 systemd-fsck[727]: ROOT: clean, 621/1628000 files, 124058/1617920 blocks Dec 13 02:09:59.842555 systemd[1]: Finished systemd-fsck-root.service. Dec 13 02:09:59.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:09:59.843813 systemd[1]: Mounting sysroot.mount... Dec 13 02:09:59.872592 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 02:09:59.879899 systemd[1]: Mounted sysroot.mount. Dec 13 02:09:59.886851 systemd[1]: Reached target initrd-root-fs.target. Dec 13 02:09:59.906247 systemd[1]: Mounting sysroot-usr.mount... Dec 13 02:09:59.917274 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 02:09:59.917333 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 02:09:59.917366 systemd[1]: Reached target ignition-diskful.target. Dec 13 02:10:00.009772 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (733) Dec 13 02:10:00.009824 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 02:10:00.009847 kernel: BTRFS info (device sda6): using free space tree Dec 13 02:10:00.009870 kernel: BTRFS info (device sda6): has skinny extents Dec 13 02:09:59.933047 systemd[1]: Mounted sysroot-usr.mount. Dec 13 02:10:00.023771 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 02:09:59.957934 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 02:10:00.032782 initrd-setup-root[754]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 02:10:00.002341 systemd[1]: Starting initrd-setup-root.service... Dec 13 02:10:00.058861 initrd-setup-root[764]: cut: /sysroot/etc/group: No such file or directory Dec 13 02:10:00.043456 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 02:10:00.085752 initrd-setup-root[772]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 02:10:00.096702 initrd-setup-root[780]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 02:10:00.120002 systemd[1]: Finished initrd-setup-root.service. Dec 13 02:10:00.159785 kernel: kauditd_printk_skb: 23 callbacks suppressed Dec 13 02:10:00.159833 kernel: audit: type=1130 audit(1734055800.118:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:00.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:00.121787 systemd[1]: Starting ignition-mount.service... Dec 13 02:10:00.168054 systemd[1]: Starting sysroot-boot.service... Dec 13 02:10:00.182422 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 02:10:00.182684 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 02:10:00.207779 ignition[799]: INFO : Ignition 2.14.0 Dec 13 02:10:00.207779 ignition[799]: INFO : Stage: mount Dec 13 02:10:00.207779 ignition[799]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:10:00.207779 ignition[799]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 02:10:00.285906 kernel: audit: type=1130 audit(1734055800.213:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:00.285957 kernel: audit: type=1130 audit(1734055800.247:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:00.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:00.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:00.213959 systemd[1]: Finished sysroot-boot.service. Dec 13 02:10:00.319889 ignition[799]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 02:10:00.319889 ignition[799]: INFO : mount: mount passed Dec 13 02:10:00.319889 ignition[799]: INFO : Ignition finished successfully Dec 13 02:10:00.395769 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (808) Dec 13 02:10:00.395814 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 02:10:00.395839 kernel: BTRFS info (device sda6): using free space tree Dec 13 02:10:00.395862 kernel: BTRFS info (device sda6): has skinny extents Dec 13 02:10:00.395884 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 02:10:00.237253 systemd[1]: Finished ignition-mount.service. Dec 13 02:10:00.250410 systemd[1]: Starting ignition-files.service... Dec 13 02:10:00.316520 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 02:10:00.419724 ignition[827]: INFO : Ignition 2.14.0 Dec 13 02:10:00.419724 ignition[827]: INFO : Stage: files Dec 13 02:10:00.419724 ignition[827]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:10:00.419724 ignition[827]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 02:10:00.419724 ignition[827]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 02:10:00.419724 ignition[827]: DEBUG : files: compiled without relabeling support, skipping Dec 13 02:10:00.497744 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (829) Dec 13 02:10:00.377976 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 02:10:00.506755 ignition[827]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 02:10:00.506755 ignition[827]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 02:10:00.506755 ignition[827]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 02:10:00.506755 ignition[827]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 02:10:00.506755 ignition[827]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 02:10:00.506755 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/hosts" Dec 13 02:10:00.506755 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(3): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 02:10:00.506755 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3037696397" Dec 13 02:10:00.506755 ignition[827]: CRITICAL : files: createFilesystemsFiles: createFiles: op(3): op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3037696397": device or resource busy Dec 13 02:10:00.506755 ignition[827]: ERROR : files: createFilesystemsFiles: createFiles: op(3): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3037696397", trying btrfs: device or resource busy Dec 13 02:10:00.506755 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3037696397" Dec 13 02:10:00.506755 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3037696397" Dec 13 02:10:00.506755 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [started] unmounting "/mnt/oem3037696397" Dec 13 02:10:00.506755 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [finished] unmounting "/mnt/oem3037696397" Dec 13 02:10:00.506755 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/hosts" Dec 13 02:10:00.506755 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 02:10:00.506755 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Dec 13 02:10:00.431178 unknown[827]: wrote ssh authorized keys file for user: core Dec 13 02:10:00.782790 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Dec 13 02:10:00.606816 systemd-networkd[683]: eth0: Gained IPv6LL Dec 13 02:10:00.838796 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 02:10:00.855722 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Dec 13 02:10:00.855722 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(8): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 02:10:00.855722 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(9): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1016006640" Dec 13 02:10:00.855722 ignition[827]: CRITICAL : files: createFilesystemsFiles: createFiles: op(8): op(9): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1016006640": device or resource busy Dec 13 02:10:00.855722 ignition[827]: ERROR : files: createFilesystemsFiles: createFiles: op(8): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1016006640", trying btrfs: device or resource busy Dec 13 02:10:00.855722 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1016006640" Dec 13 02:10:00.855722 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(a): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1016006640" Dec 13 02:10:00.855722 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(b): [started] unmounting "/mnt/oem1016006640" Dec 13 02:10:00.855722 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(b): [finished] unmounting "/mnt/oem1016006640" Dec 13 02:10:00.855722 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Dec 13 02:10:00.855722 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/install.sh" Dec 13 02:10:00.855722 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 02:10:00.855722 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 02:10:00.855722 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 02:10:00.855722 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 02:10:01.101748 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 02:10:01.101748 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 02:10:01.101748 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 02:10:01.101748 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 02:10:01.101748 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 02:10:01.101748 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(11): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 02:10:01.101748 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(11): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 02:10:01.101748 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/etc/systemd/system/oem-gce.service" Dec 13 02:10:01.101748 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(12): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 02:10:01.101748 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(13): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3228450075" Dec 13 02:10:01.101748 ignition[827]: CRITICAL : files: createFilesystemsFiles: createFiles: op(12): op(13): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3228450075": device or resource busy Dec 13 02:10:01.101748 ignition[827]: ERROR : files: createFilesystemsFiles: createFiles: op(12): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3228450075", trying btrfs: device or resource busy Dec 13 02:10:01.101748 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3228450075" Dec 13 02:10:01.101748 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3228450075" Dec 13 02:10:01.344747 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [started] unmounting "/mnt/oem3228450075" Dec 13 02:10:01.344747 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [finished] unmounting "/mnt/oem3228450075" Dec 13 02:10:01.344747 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/etc/systemd/system/oem-gce.service" Dec 13 02:10:01.344747 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(16): [started] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Dec 13 02:10:01.344747 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(16): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 02:10:01.344747 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(17): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem184154516" Dec 13 02:10:01.344747 ignition[827]: CRITICAL : files: createFilesystemsFiles: createFiles: op(16): op(17): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem184154516": device or resource busy Dec 13 02:10:01.344747 ignition[827]: ERROR : files: createFilesystemsFiles: createFiles: op(16): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem184154516", trying btrfs: device or resource busy Dec 13 02:10:01.344747 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(18): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem184154516" Dec 13 02:10:01.344747 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(18): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem184154516" Dec 13 02:10:01.344747 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(19): [started] unmounting "/mnt/oem184154516" Dec 13 02:10:01.344747 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(19): [finished] unmounting "/mnt/oem184154516" Dec 13 02:10:01.344747 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(16): [finished] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Dec 13 02:10:01.344747 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(1a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 02:10:01.584754 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(1a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-x86-64.raw: attempt #1 Dec 13 02:10:01.584754 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(1a): GET result: OK Dec 13 02:10:01.762410 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(1a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 02:10:01.780767 ignition[827]: INFO : files: op(1b): [started] processing unit "oem-gce-enable-oslogin.service" Dec 13 02:10:01.780767 ignition[827]: INFO : files: op(1b): [finished] processing unit "oem-gce-enable-oslogin.service" Dec 13 02:10:01.780767 ignition[827]: INFO : files: op(1c): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 02:10:01.780767 ignition[827]: INFO : files: op(1c): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 02:10:01.780767 ignition[827]: INFO : files: op(1d): [started] processing unit "oem-gce.service" Dec 13 02:10:01.780767 ignition[827]: INFO : files: op(1d): [finished] processing unit "oem-gce.service" Dec 13 02:10:01.780767 ignition[827]: INFO : files: op(1e): [started] processing unit "prepare-helm.service" Dec 13 02:10:01.780767 ignition[827]: INFO : files: op(1e): op(1f): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 02:10:01.780767 ignition[827]: INFO : files: op(1e): op(1f): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 02:10:01.780767 ignition[827]: INFO : files: op(1e): [finished] processing unit "prepare-helm.service" Dec 13 02:10:01.780767 ignition[827]: INFO : files: op(20): [started] setting preset to enabled for "prepare-helm.service" Dec 13 02:10:01.780767 ignition[827]: INFO : files: op(20): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 02:10:01.780767 ignition[827]: INFO : files: op(21): [started] setting preset to enabled for "oem-gce-enable-oslogin.service" Dec 13 02:10:01.780767 ignition[827]: INFO : files: op(21): [finished] setting preset to enabled for "oem-gce-enable-oslogin.service" Dec 13 02:10:01.780767 ignition[827]: INFO : files: op(22): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 02:10:01.780767 ignition[827]: INFO : files: op(22): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 02:10:01.780767 ignition[827]: INFO : files: op(23): [started] setting preset to enabled for "oem-gce.service" Dec 13 02:10:01.780767 ignition[827]: INFO : files: op(23): [finished] setting preset to enabled for "oem-gce.service" Dec 13 02:10:01.780767 ignition[827]: INFO : files: createResultFile: createFiles: op(24): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 02:10:01.780767 ignition[827]: INFO : files: createResultFile: createFiles: op(24): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 02:10:01.780767 ignition[827]: INFO : files: files passed Dec 13 02:10:01.780767 ignition[827]: INFO : Ignition finished successfully Dec 13 02:10:02.288887 kernel: audit: type=1130 audit(1734055801.787:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:02.288936 kernel: audit: type=1130 audit(1734055801.858:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:02.288953 kernel: audit: type=1130 audit(1734055801.916:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:02.288968 kernel: audit: type=1131 audit(1734055801.916:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:02.288985 kernel: audit: type=1130 audit(1734055802.045:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:02.289000 kernel: audit: type=1131 audit(1734055802.045:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:02.289018 kernel: audit: type=1130 audit(1734055802.206:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:01.787000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:01.858000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:01.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:01.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:02.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:02.045000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:02.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:01.771426 systemd[1]: Finished ignition-files.service. Dec 13 02:10:01.799071 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 02:10:01.821942 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 02:10:02.334000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:02.352929 initrd-setup-root-after-ignition[850]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 02:10:01.823153 systemd[1]: Starting ignition-quench.service... Dec 13 02:10:01.842276 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 02:10:01.860363 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 02:10:01.860507 systemd[1]: Finished ignition-quench.service. Dec 13 02:10:01.918004 systemd[1]: Reached target ignition-complete.target. Dec 13 02:10:01.969966 systemd[1]: Starting initrd-parse-etc.service... Dec 13 02:10:02.008664 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 02:10:02.008794 systemd[1]: Finished initrd-parse-etc.service. Dec 13 02:10:02.047023 systemd[1]: Reached target initrd-fs.target. Dec 13 02:10:02.117933 systemd[1]: Reached target initrd.target. Dec 13 02:10:02.152011 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 02:10:02.535000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:02.153362 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 02:10:02.187085 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 02:10:02.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:02.209465 systemd[1]: Starting initrd-cleanup.service... Dec 13 02:10:02.587000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:02.250293 systemd[1]: Stopped target nss-lookup.target. Dec 13 02:10:02.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:02.282074 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 02:10:02.619743 ignition[865]: INFO : Ignition 2.14.0 Dec 13 02:10:02.619743 ignition[865]: INFO : Stage: umount Dec 13 02:10:02.619743 ignition[865]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:10:02.619743 ignition[865]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 02:10:02.304115 systemd[1]: Stopped target timers.target. Dec 13 02:10:02.671953 iscsid[693]: iscsid shutting down. Dec 13 02:10:02.689743 ignition[865]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 02:10:02.689743 ignition[865]: INFO : umount: umount passed Dec 13 02:10:02.689743 ignition[865]: INFO : Ignition finished successfully Dec 13 02:10:02.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:02.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:02.318057 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 02:10:02.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:02.318252 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 02:10:02.758000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:02.336246 systemd[1]: Stopped target initrd.target. Dec 13 02:10:02.772000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:02.360045 systemd[1]: Stopped target basic.target. Dec 13 02:10:02.787000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:02.787000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:02.380953 systemd[1]: Stopped target ignition-complete.target. Dec 13 02:10:02.803000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:02.395926 systemd[1]: Stopped target ignition-diskful.target. Dec 13 02:10:02.820000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:02.411916 systemd[1]: Stopped target initrd-root-device.target. Dec 13 02:10:02.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:02.428925 systemd[1]: Stopped target remote-fs.target. Dec 13 02:10:02.854000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:02.444926 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 02:10:02.460935 systemd[1]: Stopped target sysinit.target. Dec 13 02:10:02.476911 systemd[1]: Stopped target local-fs.target. Dec 13 02:10:02.492916 systemd[1]: Stopped target local-fs-pre.target. Dec 13 02:10:02.507949 systemd[1]: Stopped target swap.target. Dec 13 02:10:02.521907 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 02:10:02.940000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:02.522129 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 02:10:02.956000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:02.537072 systemd[1]: Stopped target cryptsetup.target. Dec 13 02:10:02.555878 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 02:10:02.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:02.556097 systemd[1]: Stopped dracut-initqueue.service. Dec 13 02:10:02.572057 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 02:10:02.572237 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 02:10:02.589023 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 02:10:02.589196 systemd[1]: Stopped ignition-files.service. Dec 13 02:10:03.061000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:02.605354 systemd[1]: Stopping ignition-mount.service... Dec 13 02:10:03.076000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:03.076000 audit: BPF prog-id=6 op=UNLOAD Dec 13 02:10:02.652499 systemd[1]: Stopping iscsid.service... Dec 13 02:10:02.684493 systemd[1]: Stopping sysroot-boot.service... Dec 13 02:10:02.689916 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 02:10:03.119000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:02.690274 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 02:10:03.137000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:02.714037 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 02:10:03.153000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:02.714216 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 02:10:02.732201 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 02:10:02.733516 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 02:10:03.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:02.733675 systemd[1]: Stopped iscsid.service. Dec 13 02:10:02.744528 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 02:10:02.744675 systemd[1]: Stopped ignition-mount.service. Dec 13 02:10:03.239000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:02.760398 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 02:10:03.254000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:02.760506 systemd[1]: Stopped sysroot-boot.service. Dec 13 02:10:03.270000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:02.775968 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 02:10:02.776078 systemd[1]: Finished initrd-cleanup.service. Dec 13 02:10:02.788999 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 02:10:03.309000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:02.789069 systemd[1]: Stopped ignition-disks.service. Dec 13 02:10:03.325000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:02.804877 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 02:10:03.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:02.804973 systemd[1]: Stopped ignition-kargs.service. Dec 13 02:10:03.356000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:02.821885 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 02:10:03.371000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:03.371000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:02.821971 systemd[1]: Stopped ignition-fetch.service. Dec 13 02:10:02.838900 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 02:10:02.838987 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 02:10:02.855875 systemd[1]: Stopped target paths.target. Dec 13 02:10:02.869726 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 02:10:03.440765 systemd-journald[190]: Received SIGTERM from PID 1 (n/a). Dec 13 02:10:02.873670 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 02:10:02.886734 systemd[1]: Stopped target slices.target. Dec 13 02:10:02.899757 systemd[1]: Stopped target sockets.target. Dec 13 02:10:02.912795 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 02:10:02.912874 systemd[1]: Closed iscsid.socket. Dec 13 02:10:02.926791 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 02:10:02.926889 systemd[1]: Stopped ignition-setup.service. Dec 13 02:10:02.941879 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 02:10:02.941974 systemd[1]: Stopped initrd-setup-root.service. Dec 13 02:10:02.957956 systemd[1]: Stopping iscsiuio.service... Dec 13 02:10:02.972172 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 02:10:02.972297 systemd[1]: Stopped iscsiuio.service. Dec 13 02:10:02.986042 systemd[1]: Stopped target network.target. Dec 13 02:10:03.002081 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 02:10:03.002159 systemd[1]: Closed iscsiuio.socket. Dec 13 02:10:03.009224 systemd[1]: Stopping systemd-networkd.service... Dec 13 02:10:03.012676 systemd-networkd[683]: eth0: DHCPv6 lease lost Dec 13 02:10:03.030962 systemd[1]: Stopping systemd-resolved.service... Dec 13 02:10:03.046138 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 02:10:03.046374 systemd[1]: Stopped systemd-resolved.service. Dec 13 02:10:03.063472 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 02:10:03.063646 systemd[1]: Stopped systemd-networkd.service. Dec 13 02:10:03.078416 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 02:10:03.078462 systemd[1]: Closed systemd-networkd.socket. Dec 13 02:10:03.093873 systemd[1]: Stopping network-cleanup.service... Dec 13 02:10:03.099882 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 02:10:03.099958 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 02:10:03.120991 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 02:10:03.121067 systemd[1]: Stopped systemd-sysctl.service. Dec 13 02:10:03.139014 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 02:10:03.139080 systemd[1]: Stopped systemd-modules-load.service. Dec 13 02:10:03.155075 systemd[1]: Stopping systemd-udevd.service... Dec 13 02:10:03.173490 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 02:10:03.174173 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 02:10:03.174326 systemd[1]: Stopped systemd-udevd.service. Dec 13 02:10:03.195079 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 02:10:03.195126 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 02:10:03.209806 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 02:10:03.209874 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 02:10:03.224815 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 02:10:03.224910 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 02:10:03.240861 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 02:10:03.240941 systemd[1]: Stopped dracut-cmdline.service. Dec 13 02:10:03.255837 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 02:10:03.255919 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 02:10:03.272886 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 02:10:03.295828 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 02:10:03.295940 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 02:10:03.311059 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 02:10:03.311127 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 02:10:03.326966 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 02:10:03.327041 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 02:10:03.343458 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 02:10:03.344179 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 02:10:03.344296 systemd[1]: Stopped network-cleanup.service. Dec 13 02:10:03.358167 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 02:10:03.358283 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 02:10:03.373124 systemd[1]: Reached target initrd-switch-root.target. Dec 13 02:10:03.389872 systemd[1]: Starting initrd-switch-root.service... Dec 13 02:10:03.404535 systemd[1]: Switching root. Dec 13 02:10:03.452893 systemd-journald[190]: Journal stopped Dec 13 02:10:08.144992 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 02:10:08.145079 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 02:10:08.145099 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 02:10:08.145118 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 02:10:08.145131 kernel: SELinux: policy capability open_perms=1 Dec 13 02:10:08.145145 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 02:10:08.145160 kernel: SELinux: policy capability always_check_network=0 Dec 13 02:10:08.145179 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 02:10:08.145193 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 02:10:08.145206 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 02:10:08.145220 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 02:10:08.145238 systemd[1]: Successfully loaded SELinux policy in 111.178ms. Dec 13 02:10:08.145280 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 11.011ms. Dec 13 02:10:08.145310 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 02:10:08.145335 systemd[1]: Detected virtualization kvm. Dec 13 02:10:08.145359 systemd[1]: Detected architecture x86-64. Dec 13 02:10:08.145383 systemd[1]: Detected first boot. Dec 13 02:10:08.145406 systemd[1]: Initializing machine ID from VM UUID. Dec 13 02:10:08.145429 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 02:10:08.145444 systemd[1]: Populated /etc with preset unit settings. Dec 13 02:10:08.145460 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:10:08.145480 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:10:08.145496 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:10:08.145518 kernel: kauditd_printk_skb: 52 callbacks suppressed Dec 13 02:10:08.145533 kernel: audit: type=1334 audit(1734055807.257:89): prog-id=12 op=LOAD Dec 13 02:10:08.145549 kernel: audit: type=1334 audit(1734055807.257:90): prog-id=3 op=UNLOAD Dec 13 02:10:08.145587 kernel: audit: type=1334 audit(1734055807.269:91): prog-id=13 op=LOAD Dec 13 02:10:08.145610 kernel: audit: type=1334 audit(1734055807.283:92): prog-id=14 op=LOAD Dec 13 02:10:08.145624 kernel: audit: type=1334 audit(1734055807.283:93): prog-id=4 op=UNLOAD Dec 13 02:10:08.145638 kernel: audit: type=1334 audit(1734055807.283:94): prog-id=5 op=UNLOAD Dec 13 02:10:08.145652 kernel: audit: type=1334 audit(1734055807.290:95): prog-id=15 op=LOAD Dec 13 02:10:08.145666 kernel: audit: type=1334 audit(1734055807.290:96): prog-id=12 op=UNLOAD Dec 13 02:10:08.145679 kernel: audit: type=1334 audit(1734055807.297:97): prog-id=16 op=LOAD Dec 13 02:10:08.145693 kernel: audit: type=1334 audit(1734055807.304:98): prog-id=17 op=LOAD Dec 13 02:10:08.145711 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 02:10:08.145726 systemd[1]: Stopped initrd-switch-root.service. Dec 13 02:10:08.145741 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 02:10:08.145755 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 02:10:08.145770 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 02:10:08.145786 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 02:10:08.145801 systemd[1]: Created slice system-getty.slice. Dec 13 02:10:08.145816 systemd[1]: Created slice system-modprobe.slice. Dec 13 02:10:08.145834 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 02:10:08.145848 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 02:10:08.145863 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 02:10:08.145878 systemd[1]: Created slice user.slice. Dec 13 02:10:08.145893 systemd[1]: Started systemd-ask-password-console.path. Dec 13 02:10:08.145908 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 02:10:08.145923 systemd[1]: Set up automount boot.automount. Dec 13 02:10:08.145937 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 02:10:08.145952 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 02:10:08.145969 systemd[1]: Stopped target initrd-fs.target. Dec 13 02:10:08.145984 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 02:10:08.145998 systemd[1]: Reached target integritysetup.target. Dec 13 02:10:08.146012 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 02:10:08.146027 systemd[1]: Reached target remote-fs.target. Dec 13 02:10:08.146041 systemd[1]: Reached target slices.target. Dec 13 02:10:08.146055 systemd[1]: Reached target swap.target. Dec 13 02:10:08.146070 systemd[1]: Reached target torcx.target. Dec 13 02:10:08.146085 systemd[1]: Reached target veritysetup.target. Dec 13 02:10:08.146105 systemd[1]: Listening on systemd-coredump.socket. Dec 13 02:10:08.146119 systemd[1]: Listening on systemd-initctl.socket. Dec 13 02:10:08.146134 systemd[1]: Listening on systemd-networkd.socket. Dec 13 02:10:08.146148 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 02:10:08.146163 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 02:10:08.146177 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 02:10:08.146192 systemd[1]: Mounting dev-hugepages.mount... Dec 13 02:10:08.146207 systemd[1]: Mounting dev-mqueue.mount... Dec 13 02:10:08.146222 systemd[1]: Mounting media.mount... Dec 13 02:10:08.146236 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:10:08.146260 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 02:10:08.146275 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 02:10:08.146289 systemd[1]: Mounting tmp.mount... Dec 13 02:10:08.146304 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 02:10:08.146318 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:10:08.146333 systemd[1]: Starting kmod-static-nodes.service... Dec 13 02:10:08.146347 systemd[1]: Starting modprobe@configfs.service... Dec 13 02:10:08.146362 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:10:08.146376 systemd[1]: Starting modprobe@drm.service... Dec 13 02:10:08.146393 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:10:08.146408 systemd[1]: Starting modprobe@fuse.service... Dec 13 02:10:08.146422 systemd[1]: Starting modprobe@loop.service... Dec 13 02:10:08.146436 kernel: fuse: init (API version 7.34) Dec 13 02:10:08.146450 kernel: loop: module loaded Dec 13 02:10:08.146464 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 02:10:08.146479 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 02:10:08.146493 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 02:10:08.146510 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 02:10:08.146528 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 02:10:08.146543 systemd[1]: Stopped systemd-journald.service. Dec 13 02:10:08.146591 systemd[1]: Starting systemd-journald.service... Dec 13 02:10:08.146615 systemd[1]: Starting systemd-modules-load.service... Dec 13 02:10:08.146631 systemd[1]: Starting systemd-network-generator.service... Dec 13 02:10:08.146653 systemd-journald[990]: Journal started Dec 13 02:10:08.146741 systemd-journald[990]: Runtime Journal (/run/log/journal/eef2b9a12848785ed764b28cf6ab639e) is 8.0M, max 148.8M, 140.8M free. Dec 13 02:10:03.453000 audit: BPF prog-id=9 op=UNLOAD Dec 13 02:10:03.745000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 02:10:03.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 02:10:03.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 02:10:03.902000 audit: BPF prog-id=10 op=LOAD Dec 13 02:10:03.902000 audit: BPF prog-id=10 op=UNLOAD Dec 13 02:10:03.902000 audit: BPF prog-id=11 op=LOAD Dec 13 02:10:03.902000 audit: BPF prog-id=11 op=UNLOAD Dec 13 02:10:04.077000 audit[898]: AVC avc: denied { associate } for pid=898 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 02:10:04.077000 audit[898]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001058e2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=881 pid=898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:04.077000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 02:10:04.088000 audit[898]: AVC avc: denied { associate } for pid=898 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 02:10:04.088000 audit[898]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001059b9 a2=1ed a3=0 items=2 ppid=881 pid=898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:04.088000 audit: CWD cwd="/" Dec 13 02:10:04.088000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:04.088000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:04.088000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 02:10:07.257000 audit: BPF prog-id=12 op=LOAD Dec 13 02:10:07.257000 audit: BPF prog-id=3 op=UNLOAD Dec 13 02:10:07.269000 audit: BPF prog-id=13 op=LOAD Dec 13 02:10:07.283000 audit: BPF prog-id=14 op=LOAD Dec 13 02:10:07.283000 audit: BPF prog-id=4 op=UNLOAD Dec 13 02:10:07.283000 audit: BPF prog-id=5 op=UNLOAD Dec 13 02:10:07.290000 audit: BPF prog-id=15 op=LOAD Dec 13 02:10:07.290000 audit: BPF prog-id=12 op=UNLOAD Dec 13 02:10:07.297000 audit: BPF prog-id=16 op=LOAD Dec 13 02:10:07.304000 audit: BPF prog-id=17 op=LOAD Dec 13 02:10:07.304000 audit: BPF prog-id=13 op=UNLOAD Dec 13 02:10:07.304000 audit: BPF prog-id=14 op=UNLOAD Dec 13 02:10:07.311000 audit: BPF prog-id=18 op=LOAD Dec 13 02:10:07.311000 audit: BPF prog-id=15 op=UNLOAD Dec 13 02:10:07.325000 audit: BPF prog-id=19 op=LOAD Dec 13 02:10:07.333000 audit: BPF prog-id=20 op=LOAD Dec 13 02:10:07.333000 audit: BPF prog-id=16 op=UNLOAD Dec 13 02:10:07.333000 audit: BPF prog-id=17 op=UNLOAD Dec 13 02:10:07.334000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:07.350000 audit: BPF prog-id=18 op=UNLOAD Dec 13 02:10:07.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:07.356000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:08.062000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:08.083000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:08.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:08.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:08.098000 audit: BPF prog-id=21 op=LOAD Dec 13 02:10:08.098000 audit: BPF prog-id=22 op=LOAD Dec 13 02:10:08.098000 audit: BPF prog-id=23 op=LOAD Dec 13 02:10:08.098000 audit: BPF prog-id=19 op=UNLOAD Dec 13 02:10:08.098000 audit: BPF prog-id=20 op=UNLOAD Dec 13 02:10:08.141000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 02:10:08.141000 audit[990]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7fff000dadd0 a2=4000 a3=7fff000dae6c items=0 ppid=1 pid=990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:08.141000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 02:10:07.256165 systemd[1]: Queued start job for default target multi-user.target. Dec 13 02:10:04.073655 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2024-12-13T02:10:04Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:10:07.335267 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 02:10:04.074793 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2024-12-13T02:10:04Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 02:10:04.074831 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2024-12-13T02:10:04Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 02:10:04.074885 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2024-12-13T02:10:04Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 02:10:04.074904 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2024-12-13T02:10:04Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 02:10:04.074963 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2024-12-13T02:10:04Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 02:10:04.074988 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2024-12-13T02:10:04Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 02:10:04.075294 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2024-12-13T02:10:04Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 02:10:04.075366 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2024-12-13T02:10:04Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 02:10:04.075392 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2024-12-13T02:10:04Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 02:10:04.077738 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2024-12-13T02:10:04Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 02:10:04.077815 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2024-12-13T02:10:04Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 02:10:04.077852 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2024-12-13T02:10:04Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 02:10:04.077881 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2024-12-13T02:10:04Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 02:10:04.077914 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2024-12-13T02:10:04Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 02:10:04.077941 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2024-12-13T02:10:04Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 02:10:06.632897 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2024-12-13T02:10:06Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:10:06.633221 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2024-12-13T02:10:06Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:10:06.633357 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2024-12-13T02:10:06Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:10:06.633606 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2024-12-13T02:10:06Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:10:06.633675 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2024-12-13T02:10:06Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 02:10:06.633748 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2024-12-13T02:10:06Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 02:10:08.157810 systemd[1]: Starting systemd-remount-fs.service... Dec 13 02:10:08.173599 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 02:10:08.188146 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 02:10:08.188249 systemd[1]: Stopped verity-setup.service. Dec 13 02:10:08.199000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:08.213593 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:10:08.222695 systemd[1]: Started systemd-journald.service. Dec 13 02:10:08.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:08.232007 systemd[1]: Mounted dev-hugepages.mount. Dec 13 02:10:08.238882 systemd[1]: Mounted dev-mqueue.mount. Dec 13 02:10:08.245851 systemd[1]: Mounted media.mount. Dec 13 02:10:08.252869 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 02:10:08.261831 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 02:10:08.270849 systemd[1]: Mounted tmp.mount. Dec 13 02:10:08.278067 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 02:10:08.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:08.288153 systemd[1]: Finished kmod-static-nodes.service. Dec 13 02:10:08.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:08.297163 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 02:10:08.297386 systemd[1]: Finished modprobe@configfs.service. Dec 13 02:10:08.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:08.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:08.306172 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:10:08.306387 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:10:08.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:08.313000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:08.315186 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 02:10:08.315411 systemd[1]: Finished modprobe@drm.service. Dec 13 02:10:08.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:08.322000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:08.324174 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:10:08.324395 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:10:08.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:08.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:08.333630 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 02:10:08.333878 systemd[1]: Finished modprobe@fuse.service. Dec 13 02:10:08.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:08.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:08.343220 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:10:08.343431 systemd[1]: Finished modprobe@loop.service. Dec 13 02:10:08.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:08.350000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:08.352211 systemd[1]: Finished systemd-modules-load.service. Dec 13 02:10:08.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:08.361224 systemd[1]: Finished systemd-network-generator.service. Dec 13 02:10:08.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:08.370224 systemd[1]: Finished systemd-remount-fs.service. Dec 13 02:10:08.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:08.379170 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 02:10:08.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:08.388467 systemd[1]: Reached target network-pre.target. Dec 13 02:10:08.398341 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 02:10:08.408122 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 02:10:08.414733 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 02:10:08.417710 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 02:10:08.426664 systemd[1]: Starting systemd-journal-flush.service... Dec 13 02:10:08.434775 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:10:08.436550 systemd[1]: Starting systemd-random-seed.service... Dec 13 02:10:08.441423 systemd-journald[990]: Time spent on flushing to /var/log/journal/eef2b9a12848785ed764b28cf6ab639e is 48.664ms for 1163 entries. Dec 13 02:10:08.441423 systemd-journald[990]: System Journal (/var/log/journal/eef2b9a12848785ed764b28cf6ab639e) is 8.0M, max 584.8M, 576.8M free. Dec 13 02:10:08.522966 systemd-journald[990]: Received client request to flush runtime journal. Dec 13 02:10:08.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:08.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:08.450289 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:10:08.452129 systemd[1]: Starting systemd-sysctl.service... Dec 13 02:10:08.460428 systemd[1]: Starting systemd-sysusers.service... Dec 13 02:10:08.469470 systemd[1]: Starting systemd-udev-settle.service... Dec 13 02:10:08.480093 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 02:10:08.488854 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 02:10:08.498051 systemd[1]: Finished systemd-random-seed.service. Dec 13 02:10:08.507164 systemd[1]: Finished systemd-sysctl.service. Dec 13 02:10:08.519396 systemd[1]: Reached target first-boot-complete.target. Dec 13 02:10:08.528461 systemd[1]: Finished systemd-journal-flush.service. Dec 13 02:10:08.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:08.538894 udevadm[1004]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 02:10:08.553728 systemd[1]: Finished systemd-sysusers.service. Dec 13 02:10:08.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:08.563615 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 02:10:08.622825 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 02:10:08.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:09.167105 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 02:10:09.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:09.175000 audit: BPF prog-id=24 op=LOAD Dec 13 02:10:09.175000 audit: BPF prog-id=25 op=LOAD Dec 13 02:10:09.175000 audit: BPF prog-id=7 op=UNLOAD Dec 13 02:10:09.175000 audit: BPF prog-id=8 op=UNLOAD Dec 13 02:10:09.177635 systemd[1]: Starting systemd-udevd.service... Dec 13 02:10:09.201044 systemd-udevd[1009]: Using default interface naming scheme 'v252'. Dec 13 02:10:09.253068 systemd[1]: Started systemd-udevd.service. Dec 13 02:10:09.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:09.263000 audit: BPF prog-id=26 op=LOAD Dec 13 02:10:09.265721 systemd[1]: Starting systemd-networkd.service... Dec 13 02:10:09.281000 audit: BPF prog-id=27 op=LOAD Dec 13 02:10:09.281000 audit: BPF prog-id=28 op=LOAD Dec 13 02:10:09.281000 audit: BPF prog-id=29 op=LOAD Dec 13 02:10:09.284119 systemd[1]: Starting systemd-userdbd.service... Dec 13 02:10:09.344234 systemd[1]: Started systemd-userdbd.service. Dec 13 02:10:09.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:09.355208 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 02:10:09.449591 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 02:10:09.514082 systemd-networkd[1019]: lo: Link UP Dec 13 02:10:09.514115 systemd-networkd[1019]: lo: Gained carrier Dec 13 02:10:09.514909 systemd-networkd[1019]: Enumeration completed Dec 13 02:10:09.515081 systemd[1]: Started systemd-networkd.service. Dec 13 02:10:09.515117 systemd-networkd[1019]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 02:10:09.517706 systemd-networkd[1019]: eth0: Link UP Dec 13 02:10:09.517880 systemd-networkd[1019]: eth0: Gained carrier Dec 13 02:10:09.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:09.528618 kernel: ACPI: button: Power Button [PWRF] Dec 13 02:10:09.532801 systemd-networkd[1019]: eth0: DHCPv4 address 10.128.0.74/32, gateway 10.128.0.1 acquired from 169.254.169.254 Dec 13 02:10:09.509000 audit[1021]: AVC avc: denied { confidentiality } for pid=1021 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 02:10:09.509000 audit[1021]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5584200839a0 a1=337fc a2=7f91ae5a0bc5 a3=5 items=110 ppid=1009 pid=1021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:09.509000 audit: CWD cwd="/" Dec 13 02:10:09.509000 audit: PATH item=0 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=1 name=(null) inode=13234 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=2 name=(null) inode=13234 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=3 name=(null) inode=13235 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=4 name=(null) inode=13234 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=5 name=(null) inode=13236 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=6 name=(null) inode=13234 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=7 name=(null) inode=13237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=8 name=(null) inode=13237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=9 name=(null) inode=13238 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=10 name=(null) inode=13237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=11 name=(null) inode=13239 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=12 name=(null) inode=13237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=13 name=(null) inode=13240 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=14 name=(null) inode=13237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=15 name=(null) inode=13241 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=16 name=(null) inode=13237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=17 name=(null) inode=13242 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=18 name=(null) inode=13234 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=19 name=(null) inode=13243 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=20 name=(null) inode=13243 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=21 name=(null) inode=13244 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=22 name=(null) inode=13243 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=23 name=(null) inode=13245 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=24 name=(null) inode=13243 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=25 name=(null) inode=13246 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=26 name=(null) inode=13243 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=27 name=(null) inode=13247 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=28 name=(null) inode=13243 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=29 name=(null) inode=13248 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=30 name=(null) inode=13234 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=31 name=(null) inode=13249 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=32 name=(null) inode=13249 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=33 name=(null) inode=13250 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=34 name=(null) inode=13249 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=35 name=(null) inode=13251 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=36 name=(null) inode=13249 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=37 name=(null) inode=13252 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=38 name=(null) inode=13249 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=39 name=(null) inode=13253 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=40 name=(null) inode=13249 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=41 name=(null) inode=13254 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=42 name=(null) inode=13234 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=43 name=(null) inode=13255 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=44 name=(null) inode=13255 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=45 name=(null) inode=13256 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=46 name=(null) inode=13255 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=47 name=(null) inode=13257 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=48 name=(null) inode=13255 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=49 name=(null) inode=13258 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=50 name=(null) inode=13255 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=51 name=(null) inode=13259 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=52 name=(null) inode=13255 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=53 name=(null) inode=13260 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=54 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=55 name=(null) inode=13261 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=56 name=(null) inode=13261 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=57 name=(null) inode=13262 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=58 name=(null) inode=13261 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=59 name=(null) inode=13263 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=60 name=(null) inode=13261 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=61 name=(null) inode=13264 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=62 name=(null) inode=13264 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=63 name=(null) inode=13265 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=64 name=(null) inode=13264 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=65 name=(null) inode=13266 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=66 name=(null) inode=13264 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=67 name=(null) inode=13267 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=68 name=(null) inode=13264 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=69 name=(null) inode=13268 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=70 name=(null) inode=13264 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=71 name=(null) inode=13269 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=72 name=(null) inode=13261 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=73 name=(null) inode=13270 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=74 name=(null) inode=13270 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=75 name=(null) inode=13271 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=76 name=(null) inode=13270 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=77 name=(null) inode=13272 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=78 name=(null) inode=13270 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=79 name=(null) inode=13273 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=80 name=(null) inode=13270 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=81 name=(null) inode=13274 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=82 name=(null) inode=13270 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=83 name=(null) inode=13275 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=84 name=(null) inode=13261 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=85 name=(null) inode=13276 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=86 name=(null) inode=13276 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=87 name=(null) inode=13277 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=88 name=(null) inode=13276 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=89 name=(null) inode=13278 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=90 name=(null) inode=13276 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=91 name=(null) inode=13279 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=92 name=(null) inode=13276 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=93 name=(null) inode=13280 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=94 name=(null) inode=13276 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=95 name=(null) inode=13281 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=96 name=(null) inode=13261 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=97 name=(null) inode=13282 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=98 name=(null) inode=13282 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=99 name=(null) inode=13283 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=100 name=(null) inode=13282 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=101 name=(null) inode=13284 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=102 name=(null) inode=13282 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=103 name=(null) inode=13285 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=104 name=(null) inode=13282 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=105 name=(null) inode=13286 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=106 name=(null) inode=13282 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=107 name=(null) inode=13287 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PATH item=109 name=(null) inode=13288 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:10:09.509000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 02:10:09.571606 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Dec 13 02:10:09.587640 kernel: EDAC MC: Ver: 3.0.0 Dec 13 02:10:09.606756 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1018) Dec 13 02:10:09.621970 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Dec 13 02:10:09.643596 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 02:10:09.648749 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 02:10:09.660677 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr Dec 13 02:10:09.662531 kernel: ACPI: button: Sleep Button [SLPF] Dec 13 02:10:09.695111 systemd[1]: Finished systemd-udev-settle.service. Dec 13 02:10:09.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:09.705382 systemd[1]: Starting lvm2-activation-early.service... Dec 13 02:10:09.734996 lvm[1046]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 02:10:09.768019 systemd[1]: Finished lvm2-activation-early.service. Dec 13 02:10:09.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:09.776945 systemd[1]: Reached target cryptsetup.target. Dec 13 02:10:09.787224 systemd[1]: Starting lvm2-activation.service... Dec 13 02:10:09.793818 lvm[1047]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 02:10:09.816967 systemd[1]: Finished lvm2-activation.service. Dec 13 02:10:09.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:09.825923 systemd[1]: Reached target local-fs-pre.target. Dec 13 02:10:09.834726 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 02:10:09.834781 systemd[1]: Reached target local-fs.target. Dec 13 02:10:09.842730 systemd[1]: Reached target machines.target. Dec 13 02:10:09.852242 systemd[1]: Starting ldconfig.service... Dec 13 02:10:09.861020 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:10:09.861121 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:10:09.862815 systemd[1]: Starting systemd-boot-update.service... Dec 13 02:10:09.871288 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 02:10:09.882365 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 02:10:09.884578 systemd[1]: Starting systemd-sysext.service... Dec 13 02:10:09.885389 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1049 (bootctl) Dec 13 02:10:09.887286 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 02:10:09.908232 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 02:10:09.915653 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 02:10:09.915926 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 02:10:09.940637 kernel: loop0: detected capacity change from 0 to 205544 Dec 13 02:10:09.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:09.945838 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 02:10:10.048652 systemd-fsck[1061]: fsck.fat 4.2 (2021-01-31) Dec 13 02:10:10.048652 systemd-fsck[1061]: /dev/sda1: 789 files, 119291/258078 clusters Dec 13 02:10:10.053323 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 02:10:10.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:10.066576 systemd[1]: Mounting boot.mount... Dec 13 02:10:10.096458 systemd[1]: Mounted boot.mount. Dec 13 02:10:10.119961 systemd[1]: Finished systemd-boot-update.service. Dec 13 02:10:10.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:10.174606 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 02:10:10.227610 kernel: loop1: detected capacity change from 0 to 205544 Dec 13 02:10:10.253465 (sd-sysext)[1065]: Using extensions 'kubernetes'. Dec 13 02:10:10.255701 (sd-sysext)[1065]: Merged extensions into '/usr'. Dec 13 02:10:10.282662 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:10:10.286135 systemd[1]: Mounting usr-share-oem.mount... Dec 13 02:10:10.294026 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:10:10.296663 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:10:10.305689 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:10:10.315954 systemd[1]: Starting modprobe@loop.service... Dec 13 02:10:10.322800 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:10:10.323061 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:10:10.323296 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:10:10.328029 systemd[1]: Mounted usr-share-oem.mount. Dec 13 02:10:10.336621 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:10:10.336831 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:10:10.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:10.344000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:10.347825 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 02:10:10.348524 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 02:10:10.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:10.358225 systemd[1]: Finished systemd-sysext.service. Dec 13 02:10:10.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:10.368167 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:10:10.368923 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:10:10.378178 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:10:10.378392 systemd[1]: Finished modprobe@loop.service. Dec 13 02:10:10.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:10.376000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:10.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:10.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:10.390991 systemd[1]: Starting ensure-sysext.service... Dec 13 02:10:10.399772 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:10:10.399892 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:10:10.401655 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 02:10:10.411873 systemd[1]: Reloading. Dec 13 02:10:10.425467 systemd-tmpfiles[1072]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 02:10:10.431325 systemd-tmpfiles[1072]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 02:10:10.435604 systemd-tmpfiles[1072]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 02:10:10.564357 /usr/lib/systemd/system-generators/torcx-generator[1094]: time="2024-12-13T02:10:10Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:10:10.564394 /usr/lib/systemd/system-generators/torcx-generator[1094]: time="2024-12-13T02:10:10Z" level=info msg="torcx already run" Dec 13 02:10:10.606110 ldconfig[1048]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 02:10:10.736513 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:10:10.736545 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:10:10.770697 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:10:10.847000 audit: BPF prog-id=30 op=LOAD Dec 13 02:10:10.847000 audit: BPF prog-id=31 op=LOAD Dec 13 02:10:10.847000 audit: BPF prog-id=24 op=UNLOAD Dec 13 02:10:10.847000 audit: BPF prog-id=25 op=UNLOAD Dec 13 02:10:10.849000 audit: BPF prog-id=32 op=LOAD Dec 13 02:10:10.849000 audit: BPF prog-id=21 op=UNLOAD Dec 13 02:10:10.849000 audit: BPF prog-id=33 op=LOAD Dec 13 02:10:10.849000 audit: BPF prog-id=34 op=LOAD Dec 13 02:10:10.849000 audit: BPF prog-id=22 op=UNLOAD Dec 13 02:10:10.849000 audit: BPF prog-id=23 op=UNLOAD Dec 13 02:10:10.850000 audit: BPF prog-id=35 op=LOAD Dec 13 02:10:10.850000 audit: BPF prog-id=27 op=UNLOAD Dec 13 02:10:10.850000 audit: BPF prog-id=36 op=LOAD Dec 13 02:10:10.850000 audit: BPF prog-id=37 op=LOAD Dec 13 02:10:10.850000 audit: BPF prog-id=28 op=UNLOAD Dec 13 02:10:10.850000 audit: BPF prog-id=29 op=UNLOAD Dec 13 02:10:10.851000 audit: BPF prog-id=38 op=LOAD Dec 13 02:10:10.851000 audit: BPF prog-id=26 op=UNLOAD Dec 13 02:10:10.859848 systemd[1]: Finished ldconfig.service. Dec 13 02:10:10.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:10.868508 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 02:10:10.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:10.883328 systemd[1]: Starting audit-rules.service... Dec 13 02:10:10.892400 systemd[1]: Starting clean-ca-certificates.service... Dec 13 02:10:10.904120 systemd[1]: Starting oem-gce-enable-oslogin.service... Dec 13 02:10:10.916126 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 02:10:10.924000 audit: BPF prog-id=39 op=LOAD Dec 13 02:10:10.927556 systemd[1]: Starting systemd-resolved.service... Dec 13 02:10:10.934000 audit: BPF prog-id=40 op=LOAD Dec 13 02:10:10.937929 systemd[1]: Starting systemd-timesyncd.service... Dec 13 02:10:10.946457 systemd[1]: Starting systemd-update-utmp.service... Dec 13 02:10:10.956000 audit[1162]: SYSTEM_BOOT pid=1162 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 02:10:10.959067 systemd[1]: Finished clean-ca-certificates.service. Dec 13 02:10:10.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:10.969580 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Dec 13 02:10:10.969839 systemd[1]: Finished oem-gce-enable-oslogin.service. Dec 13 02:10:10.973167 augenrules[1166]: No rules Dec 13 02:10:10.971000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 02:10:10.971000 audit[1166]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffde974e000 a2=420 a3=0 items=0 ppid=1136 pid=1166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:10.971000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 02:10:10.979514 systemd[1]: Finished audit-rules.service. Dec 13 02:10:10.987414 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 02:10:11.003260 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:10:11.004795 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:10:11.009975 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:10:11.019044 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:10:11.029155 systemd[1]: Starting modprobe@loop.service... Dec 13 02:10:11.038941 systemd[1]: Starting oem-gce-enable-oslogin.service... Dec 13 02:10:11.045766 enable-oslogin[1174]: /etc/pam.d/sshd already exists. Not enabling OS Login Dec 13 02:10:11.047767 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:10:11.048165 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:10:11.050969 systemd[1]: Starting systemd-update-done.service... Dec 13 02:10:11.058856 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 02:10:11.059207 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:10:11.062943 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:10:11.063195 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:10:11.073989 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:10:11.074299 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:10:11.083694 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:10:11.083904 systemd[1]: Finished modprobe@loop.service. Dec 13 02:10:11.093772 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Dec 13 02:10:11.094063 systemd[1]: Finished oem-gce-enable-oslogin.service. Dec 13 02:10:11.104440 systemd[1]: Finished systemd-update-done.service. Dec 13 02:10:11.117158 systemd[1]: Finished systemd-update-utmp.service. Dec 13 02:10:11.127593 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:10:11.128065 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:10:11.130555 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:10:11.134415 systemd-resolved[1155]: Positive Trust Anchors: Dec 13 02:10:11.134441 systemd-resolved[1155]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 02:10:11.134495 systemd-resolved[1155]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 02:10:11.139988 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:10:11.148879 systemd[1]: Starting modprobe@loop.service... Dec 13 02:10:11.153820 systemd-resolved[1155]: Defaulting to hostname 'linux'. Dec 13 02:10:11.158440 systemd[1]: Starting oem-gce-enable-oslogin.service... Dec 13 02:10:11.164776 enable-oslogin[1179]: /etc/pam.d/sshd already exists. Not enabling OS Login Dec 13 02:10:11.166790 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:10:11.167062 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:10:11.167267 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 02:10:11.167434 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:10:11.169383 systemd[1]: Started systemd-resolved.service. Dec 13 02:10:11.178590 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:10:11.178927 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:10:11.188455 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:10:11.188676 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:10:11.197411 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:10:11.197645 systemd[1]: Finished modprobe@loop.service. Dec 13 02:10:11.203989 systemd-timesyncd[1159]: Contacted time server 169.254.169.254:123 (169.254.169.254). Dec 13 02:10:11.204070 systemd-timesyncd[1159]: Initial clock synchronization to Fri 2024-12-13 02:10:11.136665 UTC. Dec 13 02:10:11.206221 systemd[1]: Started systemd-timesyncd.service. Dec 13 02:10:11.215775 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Dec 13 02:10:11.216017 systemd[1]: Finished oem-gce-enable-oslogin.service. Dec 13 02:10:11.229501 systemd[1]: Reached target network.target. Dec 13 02:10:11.237928 systemd[1]: Reached target nss-lookup.target. Dec 13 02:10:11.246943 systemd[1]: Reached target time-set.target. Dec 13 02:10:11.255876 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:10:11.256335 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:10:11.258309 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:10:11.267795 systemd[1]: Starting modprobe@drm.service... Dec 13 02:10:11.277026 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:10:11.286796 systemd[1]: Starting modprobe@loop.service... Dec 13 02:10:11.296829 systemd[1]: Starting oem-gce-enable-oslogin.service... Dec 13 02:10:11.301016 enable-oslogin[1185]: /etc/pam.d/sshd already exists. Not enabling OS Login Dec 13 02:10:11.305881 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:10:11.306247 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:10:11.308532 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 02:10:11.316776 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 02:10:11.317038 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:10:11.319702 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:10:11.319930 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:10:11.329472 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 02:10:11.329834 systemd[1]: Finished modprobe@drm.service. Dec 13 02:10:11.339399 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:10:11.339632 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:10:11.348367 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:10:11.348620 systemd[1]: Finished modprobe@loop.service. Dec 13 02:10:11.357323 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Dec 13 02:10:11.357595 systemd[1]: Finished oem-gce-enable-oslogin.service. Dec 13 02:10:11.366908 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:10:11.367051 systemd[1]: Reached target sysinit.target. Dec 13 02:10:11.375840 systemd[1]: Started motdgen.path. Dec 13 02:10:11.382748 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 02:10:11.392919 systemd[1]: Started logrotate.timer. Dec 13 02:10:11.399942 systemd[1]: Started mdadm.timer. Dec 13 02:10:11.407795 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 02:10:11.416752 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 02:10:11.416819 systemd[1]: Reached target paths.target. Dec 13 02:10:11.423741 systemd[1]: Reached target timers.target. Dec 13 02:10:11.431441 systemd[1]: Listening on dbus.socket. Dec 13 02:10:11.440111 systemd[1]: Starting docker.socket... Dec 13 02:10:11.450547 systemd[1]: Listening on sshd.socket. Dec 13 02:10:11.457863 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:10:11.457952 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:10:11.458929 systemd[1]: Finished ensure-sysext.service. Dec 13 02:10:11.467920 systemd[1]: Listening on docker.socket. Dec 13 02:10:11.475786 systemd[1]: Reached target sockets.target. Dec 13 02:10:11.484697 systemd[1]: Reached target basic.target. Dec 13 02:10:11.491812 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 02:10:11.491869 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 02:10:11.493510 systemd[1]: Starting containerd.service... Dec 13 02:10:11.502192 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 02:10:11.514528 systemd[1]: Starting dbus.service... Dec 13 02:10:11.522548 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 02:10:11.534248 systemd[1]: Starting extend-filesystems.service... Dec 13 02:10:11.537600 jq[1192]: false Dec 13 02:10:11.541737 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 02:10:11.543652 systemd[1]: Starting motdgen.service... Dec 13 02:10:11.549732 systemd-networkd[1019]: eth0: Gained IPv6LL Dec 13 02:10:11.553336 systemd[1]: Starting prepare-helm.service... Dec 13 02:10:11.562373 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 02:10:11.572588 systemd[1]: Starting sshd-keygen.service... Dec 13 02:10:11.583755 systemd[1]: Starting systemd-logind.service... Dec 13 02:10:11.591750 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:10:11.591854 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionSecurity=!tpm2). Dec 13 02:10:11.592614 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 02:10:11.593878 systemd[1]: Starting update-engine.service... Dec 13 02:10:11.602428 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 02:10:11.608508 jq[1214]: true Dec 13 02:10:11.612611 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 02:10:11.619831 extend-filesystems[1194]: Found loop1 Dec 13 02:10:11.619831 extend-filesystems[1194]: Found sda Dec 13 02:10:11.619831 extend-filesystems[1194]: Found sda1 Dec 13 02:10:11.682837 extend-filesystems[1194]: Found sda2 Dec 13 02:10:11.682837 extend-filesystems[1194]: Found sda3 Dec 13 02:10:11.682837 extend-filesystems[1194]: Found usr Dec 13 02:10:11.682837 extend-filesystems[1194]: Found sda4 Dec 13 02:10:11.682837 extend-filesystems[1194]: Found sda6 Dec 13 02:10:11.682837 extend-filesystems[1194]: Found sda7 Dec 13 02:10:11.682837 extend-filesystems[1194]: Found sda9 Dec 13 02:10:11.682837 extend-filesystems[1194]: Checking size of /dev/sda9 Dec 13 02:10:11.898068 kernel: EXT4-fs (sda9): resizing filesystem from 1617920 to 2538491 blocks Dec 13 02:10:11.898178 kernel: loop2: detected capacity change from 0 to 2097152 Dec 13 02:10:11.898737 kernel: EXT4-fs (sda9): resized filesystem to 2538491 Dec 13 02:10:11.625386 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 02:10:11.899046 update_engine[1212]: I1213 02:10:11.807097 1212 main.cc:92] Flatcar Update Engine starting Dec 13 02:10:11.899046 update_engine[1212]: I1213 02:10:11.818328 1212 update_check_scheduler.cc:74] Next update check in 11m40s Dec 13 02:10:11.725368 dbus-daemon[1191]: [system] SELinux support is enabled Dec 13 02:10:11.900531 extend-filesystems[1194]: Resized partition /dev/sda9 Dec 13 02:10:11.625705 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 02:10:11.754843 dbus-daemon[1191]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.1' (uid=244 pid=1019 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Dec 13 02:10:11.909313 extend-filesystems[1235]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 02:10:11.909313 extend-filesystems[1235]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Dec 13 02:10:11.909313 extend-filesystems[1235]: old_desc_blocks = 1, new_desc_blocks = 2 Dec 13 02:10:11.909313 extend-filesystems[1235]: The filesystem on /dev/sda9 is now 2538491 (4k) blocks long. Dec 13 02:10:11.981741 kernel: EXT4-fs (loop2): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 02:10:11.981792 tar[1217]: linux-amd64/helm Dec 13 02:10:11.627457 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 02:10:11.762750 dbus-daemon[1191]: [system] Successfully activated service 'org.freedesktop.systemd1' Dec 13 02:10:11.982506 extend-filesystems[1194]: Resized filesystem in /dev/sda9 Dec 13 02:10:11.990788 jq[1219]: true Dec 13 02:10:11.627808 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 02:10:11.641391 systemd[1]: Reached target network-online.target. Dec 13 02:10:11.653118 systemd[1]: Starting kubelet.service... Dec 13 02:10:11.656394 systemd[1]: Starting oem-gce.service... Dec 13 02:10:11.688531 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 02:10:11.688820 systemd[1]: Finished motdgen.service. Dec 13 02:10:11.994656 mkfs.ext4[1226]: mke2fs 1.46.5 (30-Dec-2021) Dec 13 02:10:11.994656 mkfs.ext4[1226]: Discarding device blocks: 0/262144\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008 \u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008done Dec 13 02:10:11.994656 mkfs.ext4[1226]: Creating filesystem with 262144 4k blocks and 65536 inodes Dec 13 02:10:11.994656 mkfs.ext4[1226]: Filesystem UUID: b21eb140-a651-4f01-bf45-3f6a581ad434 Dec 13 02:10:11.994656 mkfs.ext4[1226]: Superblock backups stored on blocks: Dec 13 02:10:11.994656 mkfs.ext4[1226]: 32768, 98304, 163840, 229376 Dec 13 02:10:11.994656 mkfs.ext4[1226]: Allocating group tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Dec 13 02:10:11.994656 mkfs.ext4[1226]: Writing inode tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Dec 13 02:10:11.994656 mkfs.ext4[1226]: Creating journal (8192 blocks): done Dec 13 02:10:11.994656 mkfs.ext4[1226]: Writing superblocks and filesystem accounting information: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Dec 13 02:10:11.725640 systemd[1]: Started dbus.service. Dec 13 02:10:11.758304 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 02:10:11.995598 bash[1255]: Updated "/home/core/.ssh/authorized_keys" Dec 13 02:10:11.758381 systemd[1]: Reached target system-config.target. Dec 13 02:10:11.996113 env[1220]: time="2024-12-13T02:10:11.995781157Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 02:10:11.766777 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 02:10:11.766816 systemd[1]: Reached target user-config.target. Dec 13 02:10:11.996809 umount[1250]: umount: /var/lib/flatcar-oem-gce.img: not mounted. Dec 13 02:10:11.784809 systemd[1]: Starting systemd-hostnamed.service... Dec 13 02:10:11.815302 systemd[1]: Started update-engine.service. Dec 13 02:10:11.835689 systemd[1]: Started locksmithd.service. Dec 13 02:10:11.903513 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 02:10:11.903797 systemd[1]: Finished extend-filesystems.service. Dec 13 02:10:11.918380 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 02:10:12.061535 systemd-logind[1211]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 02:10:12.061619 systemd-logind[1211]: Watching system buttons on /dev/input/event3 (Sleep Button) Dec 13 02:10:12.061652 systemd-logind[1211]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 02:10:12.063464 systemd-logind[1211]: New seat seat0. Dec 13 02:10:12.067924 systemd[1]: Started systemd-logind.service. Dec 13 02:10:12.260290 env[1220]: time="2024-12-13T02:10:12.260167284Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 02:10:12.260441 env[1220]: time="2024-12-13T02:10:12.260365944Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:10:12.266808 env[1220]: time="2024-12-13T02:10:12.266751173Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:10:12.266808 env[1220]: time="2024-12-13T02:10:12.266804712Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:10:12.267183 env[1220]: time="2024-12-13T02:10:12.267139976Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:10:12.267267 env[1220]: time="2024-12-13T02:10:12.267183331Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 02:10:12.267267 env[1220]: time="2024-12-13T02:10:12.267206367Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 02:10:12.267267 env[1220]: time="2024-12-13T02:10:12.267223037Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 02:10:12.267418 env[1220]: time="2024-12-13T02:10:12.267345699Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:10:12.267797 env[1220]: time="2024-12-13T02:10:12.267737935Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:10:12.268007 env[1220]: time="2024-12-13T02:10:12.267969786Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:10:12.268084 env[1220]: time="2024-12-13T02:10:12.268008383Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 02:10:12.268135 env[1220]: time="2024-12-13T02:10:12.268092392Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 02:10:12.268135 env[1220]: time="2024-12-13T02:10:12.268111865Z" level=info msg="metadata content store policy set" policy=shared Dec 13 02:10:12.273887 dbus-daemon[1191]: [system] Successfully activated service 'org.freedesktop.hostname1' Dec 13 02:10:12.274117 systemd[1]: Started systemd-hostnamed.service. Dec 13 02:10:12.276375 dbus-daemon[1191]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1246 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Dec 13 02:10:12.285623 systemd[1]: Starting polkit.service... Dec 13 02:10:12.287399 coreos-metadata[1190]: Dec 13 02:10:12.287 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/sshKeys: Attempt #1 Dec 13 02:10:12.290853 env[1220]: time="2024-12-13T02:10:12.290795719Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 02:10:12.290966 env[1220]: time="2024-12-13T02:10:12.290882666Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 02:10:12.290966 env[1220]: time="2024-12-13T02:10:12.290908120Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 02:10:12.290966 env[1220]: time="2024-12-13T02:10:12.290957972Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 02:10:12.291104 env[1220]: time="2024-12-13T02:10:12.290983396Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 02:10:12.291104 env[1220]: time="2024-12-13T02:10:12.291007606Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 02:10:12.291104 env[1220]: time="2024-12-13T02:10:12.291029113Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 02:10:12.291104 env[1220]: time="2024-12-13T02:10:12.291052537Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 02:10:12.291104 env[1220]: time="2024-12-13T02:10:12.291074601Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 02:10:12.291104 env[1220]: time="2024-12-13T02:10:12.291098459Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 02:10:12.291387 env[1220]: time="2024-12-13T02:10:12.291119864Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 02:10:12.291387 env[1220]: time="2024-12-13T02:10:12.291143879Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 02:10:12.296750 env[1220]: time="2024-12-13T02:10:12.293024406Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 02:10:12.296750 env[1220]: time="2024-12-13T02:10:12.293191447Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 02:10:12.296750 env[1220]: time="2024-12-13T02:10:12.293604239Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 02:10:12.296750 env[1220]: time="2024-12-13T02:10:12.293651598Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 02:10:12.296750 env[1220]: time="2024-12-13T02:10:12.293675923Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 02:10:12.296750 env[1220]: time="2024-12-13T02:10:12.293746945Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 02:10:12.296750 env[1220]: time="2024-12-13T02:10:12.293767974Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 02:10:12.296750 env[1220]: time="2024-12-13T02:10:12.293788262Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 02:10:12.296750 env[1220]: time="2024-12-13T02:10:12.293807420Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 02:10:12.296750 env[1220]: time="2024-12-13T02:10:12.293826283Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 02:10:12.296750 env[1220]: time="2024-12-13T02:10:12.293848162Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 02:10:12.296750 env[1220]: time="2024-12-13T02:10:12.296172718Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 02:10:12.296750 env[1220]: time="2024-12-13T02:10:12.296235738Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 02:10:12.296750 env[1220]: time="2024-12-13T02:10:12.296273931Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 02:10:12.296750 env[1220]: time="2024-12-13T02:10:12.296624227Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 02:10:12.297430 env[1220]: time="2024-12-13T02:10:12.296665805Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 02:10:12.297430 env[1220]: time="2024-12-13T02:10:12.296823457Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 02:10:12.297430 env[1220]: time="2024-12-13T02:10:12.296857805Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 02:10:12.297430 env[1220]: time="2024-12-13T02:10:12.296891382Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 02:10:12.297430 env[1220]: time="2024-12-13T02:10:12.296968802Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 02:10:12.297430 env[1220]: time="2024-12-13T02:10:12.297008602Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 02:10:12.297430 env[1220]: time="2024-12-13T02:10:12.297187548Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 02:10:12.298137 env[1220]: time="2024-12-13T02:10:12.297911809Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 02:10:12.301582 env[1220]: time="2024-12-13T02:10:12.298154318Z" level=info msg="Connect containerd service" Dec 13 02:10:12.301582 env[1220]: time="2024-12-13T02:10:12.298749603Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 02:10:12.301724 coreos-metadata[1190]: Dec 13 02:10:12.298 INFO Fetch failed with 404: resource not found Dec 13 02:10:12.301724 coreos-metadata[1190]: Dec 13 02:10:12.298 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/ssh-keys: Attempt #1 Dec 13 02:10:12.301724 coreos-metadata[1190]: Dec 13 02:10:12.299 INFO Fetch successful Dec 13 02:10:12.301724 coreos-metadata[1190]: Dec 13 02:10:12.299 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/block-project-ssh-keys: Attempt #1 Dec 13 02:10:12.301724 coreos-metadata[1190]: Dec 13 02:10:12.300 INFO Fetch failed with 404: resource not found Dec 13 02:10:12.301724 coreos-metadata[1190]: Dec 13 02:10:12.300 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/sshKeys: Attempt #1 Dec 13 02:10:12.302000 coreos-metadata[1190]: Dec 13 02:10:12.301 INFO Fetch failed with 404: resource not found Dec 13 02:10:12.302000 coreos-metadata[1190]: Dec 13 02:10:12.301 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/ssh-keys: Attempt #1 Dec 13 02:10:12.303184 coreos-metadata[1190]: Dec 13 02:10:12.303 INFO Fetch successful Dec 13 02:10:12.305895 unknown[1190]: wrote ssh authorized keys file for user: core Dec 13 02:10:12.317301 env[1220]: time="2024-12-13T02:10:12.317236310Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 02:10:12.318173 env[1220]: time="2024-12-13T02:10:12.318130479Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 02:10:12.318438 env[1220]: time="2024-12-13T02:10:12.318414667Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 02:10:12.318681 env[1220]: time="2024-12-13T02:10:12.318660408Z" level=info msg="containerd successfully booted in 0.324039s" Dec 13 02:10:12.319205 systemd[1]: Started containerd.service. Dec 13 02:10:12.319831 env[1220]: time="2024-12-13T02:10:12.319769187Z" level=info msg="Start subscribing containerd event" Dec 13 02:10:12.319913 env[1220]: time="2024-12-13T02:10:12.319845410Z" level=info msg="Start recovering state" Dec 13 02:10:12.319966 env[1220]: time="2024-12-13T02:10:12.319944355Z" level=info msg="Start event monitor" Dec 13 02:10:12.320017 env[1220]: time="2024-12-13T02:10:12.319971149Z" level=info msg="Start snapshots syncer" Dec 13 02:10:12.320017 env[1220]: time="2024-12-13T02:10:12.319988737Z" level=info msg="Start cni network conf syncer for default" Dec 13 02:10:12.320017 env[1220]: time="2024-12-13T02:10:12.320003100Z" level=info msg="Start streaming server" Dec 13 02:10:12.366641 update-ssh-keys[1268]: Updated "/home/core/.ssh/authorized_keys" Dec 13 02:10:12.367377 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 02:10:12.417478 polkitd[1267]: Started polkitd version 121 Dec 13 02:10:12.444019 polkitd[1267]: Loading rules from directory /etc/polkit-1/rules.d Dec 13 02:10:12.444121 polkitd[1267]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 13 02:10:12.457784 polkitd[1267]: Finished loading, compiling and executing 2 rules Dec 13 02:10:12.458528 dbus-daemon[1191]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Dec 13 02:10:12.458963 systemd[1]: Started polkit.service. Dec 13 02:10:12.459871 polkitd[1267]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Dec 13 02:10:12.496705 systemd-hostnamed[1246]: Hostname set to (transient) Dec 13 02:10:12.499354 systemd-resolved[1155]: System hostname changed to 'ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal'. Dec 13 02:10:13.594396 tar[1217]: linux-amd64/LICENSE Dec 13 02:10:13.596717 tar[1217]: linux-amd64/README.md Dec 13 02:10:13.608223 systemd[1]: Finished prepare-helm.service. Dec 13 02:10:13.786537 sshd_keygen[1213]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 02:10:13.832283 systemd[1]: Finished sshd-keygen.service. Dec 13 02:10:13.842289 systemd[1]: Starting issuegen.service... Dec 13 02:10:13.858879 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 02:10:13.859160 systemd[1]: Finished issuegen.service. Dec 13 02:10:13.871677 systemd[1]: Starting systemd-user-sessions.service... Dec 13 02:10:13.881274 systemd[1]: Started kubelet.service. Dec 13 02:10:13.890839 systemd[1]: Finished systemd-user-sessions.service. Dec 13 02:10:13.903909 systemd[1]: Started getty@tty1.service. Dec 13 02:10:13.915199 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 02:10:13.922047 systemd[1]: Reached target getty.target. Dec 13 02:10:14.052917 locksmithd[1254]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 02:10:14.854208 kubelet[1289]: E1213 02:10:14.854136 1289 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:10:14.858899 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:10:14.859153 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:10:14.859571 systemd[1]: kubelet.service: Consumed 1.370s CPU time. Dec 13 02:10:17.243835 systemd[1]: var-lib-flatcar\x2doem\x2dgce.mount: Deactivated successfully. Dec 13 02:10:19.420600 kernel: loop2: detected capacity change from 0 to 2097152 Dec 13 02:10:19.439615 systemd-nspawn[1302]: Spawning container oem-gce on /var/lib/flatcar-oem-gce.img. Dec 13 02:10:19.439615 systemd-nspawn[1302]: Press ^] three times within 1s to kill container. Dec 13 02:10:19.454630 kernel: EXT4-fs (loop2): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 02:10:19.544243 systemd[1]: Started oem-gce.service. Dec 13 02:10:19.544719 systemd[1]: Reached target multi-user.target. Dec 13 02:10:19.547149 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 02:10:19.557594 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 02:10:19.557863 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 02:10:19.558077 systemd[1]: Startup finished in 1.041s (kernel) + 7.806s (initrd) + 15.940s (userspace) = 24.788s. Dec 13 02:10:19.607136 systemd-nspawn[1302]: + '[' -e /etc/default/instance_configs.cfg.template ']' Dec 13 02:10:19.607136 systemd-nspawn[1302]: + echo -e '[InstanceSetup]\nset_host_keys = false' Dec 13 02:10:19.607444 systemd-nspawn[1302]: + /usr/bin/google_instance_setup Dec 13 02:10:20.237770 instance-setup[1308]: INFO Running google_set_multiqueue. Dec 13 02:10:20.253893 instance-setup[1308]: INFO Set channels for eth0 to 2. Dec 13 02:10:20.258287 instance-setup[1308]: INFO Setting /proc/irq/31/smp_affinity_list to 0 for device virtio1. Dec 13 02:10:20.260058 instance-setup[1308]: INFO /proc/irq/31/smp_affinity_list: real affinity 0 Dec 13 02:10:20.260615 instance-setup[1308]: INFO Setting /proc/irq/32/smp_affinity_list to 0 for device virtio1. Dec 13 02:10:20.262372 instance-setup[1308]: INFO /proc/irq/32/smp_affinity_list: real affinity 0 Dec 13 02:10:20.262863 instance-setup[1308]: INFO Setting /proc/irq/33/smp_affinity_list to 1 for device virtio1. Dec 13 02:10:20.264532 instance-setup[1308]: INFO /proc/irq/33/smp_affinity_list: real affinity 1 Dec 13 02:10:20.264919 instance-setup[1308]: INFO Setting /proc/irq/34/smp_affinity_list to 1 for device virtio1. Dec 13 02:10:20.266426 instance-setup[1308]: INFO /proc/irq/34/smp_affinity_list: real affinity 1 Dec 13 02:10:20.280491 instance-setup[1308]: INFO Queue 0 XPS=1 for /sys/class/net/eth0/queues/tx-0/xps_cpus Dec 13 02:10:20.280698 instance-setup[1308]: INFO Queue 1 XPS=2 for /sys/class/net/eth0/queues/tx-1/xps_cpus Dec 13 02:10:20.326793 systemd-nspawn[1302]: + /usr/bin/google_metadata_script_runner --script-type startup Dec 13 02:10:20.362978 systemd[1]: Created slice system-sshd.slice. Dec 13 02:10:20.366176 systemd[1]: Started sshd@0-10.128.0.74:22-139.178.68.195:58236.service. Dec 13 02:10:20.698454 startup-script[1339]: INFO Starting startup scripts. Dec 13 02:10:20.704258 sshd[1341]: Accepted publickey for core from 139.178.68.195 port 58236 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:10:20.708120 sshd[1341]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:10:20.714493 startup-script[1339]: INFO No startup scripts found in metadata. Dec 13 02:10:20.714726 startup-script[1339]: INFO Finished running startup scripts. Dec 13 02:10:20.728330 systemd[1]: Created slice user-500.slice. Dec 13 02:10:20.732238 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 02:10:20.750031 systemd-logind[1211]: New session 1 of user core. Dec 13 02:10:20.759085 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 02:10:20.762730 systemd[1]: Starting user@500.service... Dec 13 02:10:20.771620 systemd-nspawn[1302]: + trap 'stopping=1 ; kill "${daemon_pids[@]}" || :' SIGTERM Dec 13 02:10:20.771620 systemd-nspawn[1302]: + daemon_pids=() Dec 13 02:10:20.771620 systemd-nspawn[1302]: + for d in accounts clock_skew network Dec 13 02:10:20.771620 systemd-nspawn[1302]: + daemon_pids+=($!) Dec 13 02:10:20.772690 systemd-nspawn[1302]: + for d in accounts clock_skew network Dec 13 02:10:20.773262 systemd-nspawn[1302]: + daemon_pids+=($!) Dec 13 02:10:20.773262 systemd-nspawn[1302]: + for d in accounts clock_skew network Dec 13 02:10:20.773496 systemd-nspawn[1302]: + daemon_pids+=($!) Dec 13 02:10:20.773787 systemd-nspawn[1302]: + NOTIFY_SOCKET=/run/systemd/notify Dec 13 02:10:20.773979 systemd-nspawn[1302]: + /usr/bin/systemd-notify --ready Dec 13 02:10:20.774708 systemd-nspawn[1302]: + /usr/bin/google_network_daemon Dec 13 02:10:20.775382 systemd-nspawn[1302]: + /usr/bin/google_clock_skew_daemon Dec 13 02:10:20.776857 systemd-nspawn[1302]: + /usr/bin/google_accounts_daemon Dec 13 02:10:20.785431 (systemd)[1346]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:10:20.870595 systemd-nspawn[1302]: + wait -n 36 37 38 Dec 13 02:10:20.973596 systemd[1346]: Queued start job for default target default.target. Dec 13 02:10:20.974469 systemd[1346]: Reached target paths.target. Dec 13 02:10:20.974506 systemd[1346]: Reached target sockets.target. Dec 13 02:10:20.974531 systemd[1346]: Reached target timers.target. Dec 13 02:10:20.974552 systemd[1346]: Reached target basic.target. Dec 13 02:10:20.974665 systemd[1346]: Reached target default.target. Dec 13 02:10:20.974721 systemd[1346]: Startup finished in 175ms. Dec 13 02:10:20.974763 systemd[1]: Started user@500.service. Dec 13 02:10:20.976531 systemd[1]: Started session-1.scope. Dec 13 02:10:21.212246 systemd[1]: Started sshd@1-10.128.0.74:22-139.178.68.195:58238.service. Dec 13 02:10:21.526303 sshd[1359]: Accepted publickey for core from 139.178.68.195 port 58238 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:10:21.527347 sshd[1359]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:10:21.529967 google-clock-skew[1348]: INFO Starting Google Clock Skew daemon. Dec 13 02:10:21.536177 systemd[1]: Started session-2.scope. Dec 13 02:10:21.537646 systemd-logind[1211]: New session 2 of user core. Dec 13 02:10:21.545982 google-clock-skew[1348]: INFO Clock drift token has changed: 0. Dec 13 02:10:21.566316 systemd-nspawn[1302]: hwclock: Cannot access the Hardware Clock via any known method. Dec 13 02:10:21.566689 systemd-nspawn[1302]: hwclock: Use the --verbose option to see the details of our search for an access method. Dec 13 02:10:21.567715 google-clock-skew[1348]: WARNING Failed to sync system time with hardware clock. Dec 13 02:10:21.741549 google-networking[1349]: INFO Starting Google Networking daemon. Dec 13 02:10:21.747317 sshd[1359]: pam_unix(sshd:session): session closed for user core Dec 13 02:10:21.754180 systemd[1]: sshd@1-10.128.0.74:22-139.178.68.195:58238.service: Deactivated successfully. Dec 13 02:10:21.755178 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 02:10:21.757027 systemd-logind[1211]: Session 2 logged out. Waiting for processes to exit. Dec 13 02:10:21.758636 systemd-logind[1211]: Removed session 2. Dec 13 02:10:21.766730 groupadd[1370]: group added to /etc/group: name=google-sudoers, GID=1000 Dec 13 02:10:21.770925 groupadd[1370]: group added to /etc/gshadow: name=google-sudoers Dec 13 02:10:21.775332 groupadd[1370]: new group: name=google-sudoers, GID=1000 Dec 13 02:10:21.793611 systemd[1]: Started sshd@2-10.128.0.74:22-139.178.68.195:58250.service. Dec 13 02:10:21.797919 google-accounts[1347]: INFO Starting Google Accounts daemon. Dec 13 02:10:21.826232 google-accounts[1347]: WARNING OS Login not installed. Dec 13 02:10:21.827392 google-accounts[1347]: INFO Creating a new user account for 0. Dec 13 02:10:21.832999 systemd-nspawn[1302]: useradd: invalid user name '0': use --badname to ignore Dec 13 02:10:21.833872 google-accounts[1347]: WARNING Could not create user 0. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', '0']' returned non-zero exit status 3.. Dec 13 02:10:22.089766 sshd[1380]: Accepted publickey for core from 139.178.68.195 port 58250 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:10:22.092231 sshd[1380]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:10:22.098682 systemd-logind[1211]: New session 3 of user core. Dec 13 02:10:22.099401 systemd[1]: Started session-3.scope. Dec 13 02:10:22.297877 sshd[1380]: pam_unix(sshd:session): session closed for user core Dec 13 02:10:22.302185 systemd[1]: sshd@2-10.128.0.74:22-139.178.68.195:58250.service: Deactivated successfully. Dec 13 02:10:22.303243 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 02:10:22.304122 systemd-logind[1211]: Session 3 logged out. Waiting for processes to exit. Dec 13 02:10:22.305349 systemd-logind[1211]: Removed session 3. Dec 13 02:10:22.343495 systemd[1]: Started sshd@3-10.128.0.74:22-139.178.68.195:58252.service. Dec 13 02:10:22.637549 sshd[1389]: Accepted publickey for core from 139.178.68.195 port 58252 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:10:22.639282 sshd[1389]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:10:22.645651 systemd-logind[1211]: New session 4 of user core. Dec 13 02:10:22.646026 systemd[1]: Started session-4.scope. Dec 13 02:10:22.852083 sshd[1389]: pam_unix(sshd:session): session closed for user core Dec 13 02:10:22.856606 systemd[1]: sshd@3-10.128.0.74:22-139.178.68.195:58252.service: Deactivated successfully. Dec 13 02:10:22.857692 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 02:10:22.858503 systemd-logind[1211]: Session 4 logged out. Waiting for processes to exit. Dec 13 02:10:22.859744 systemd-logind[1211]: Removed session 4. Dec 13 02:10:22.897530 systemd[1]: Started sshd@4-10.128.0.74:22-139.178.68.195:58256.service. Dec 13 02:10:22.958776 systemd[1]: Started sshd@5-10.128.0.74:22-104.40.60.93:54250.service. Dec 13 02:10:22.977533 sshd[1399]: kex_exchange_identification: client sent invalid protocol identifier "MGLNDD_34.42.14.55_22" Dec 13 02:10:22.977533 sshd[1399]: banner exchange: Connection from 104.40.60.93 port 54250: invalid format Dec 13 02:10:22.978413 systemd[1]: sshd@5-10.128.0.74:22-104.40.60.93:54250.service: Deactivated successfully. Dec 13 02:10:23.187519 sshd[1396]: Accepted publickey for core from 139.178.68.195 port 58256 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:10:23.189222 sshd[1396]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:10:23.195657 systemd[1]: Started session-5.scope. Dec 13 02:10:23.196449 systemd-logind[1211]: New session 5 of user core. Dec 13 02:10:23.383200 sudo[1402]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 02:10:23.383650 sudo[1402]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:10:23.392815 dbus-daemon[1191]: \xd0}\xf1m.V: received setenforce notice (enforcing=1743262224) Dec 13 02:10:23.395018 sudo[1402]: pam_unix(sudo:session): session closed for user root Dec 13 02:10:23.439126 sshd[1396]: pam_unix(sshd:session): session closed for user core Dec 13 02:10:23.444030 systemd[1]: sshd@4-10.128.0.74:22-139.178.68.195:58256.service: Deactivated successfully. Dec 13 02:10:23.445179 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 02:10:23.446107 systemd-logind[1211]: Session 5 logged out. Waiting for processes to exit. Dec 13 02:10:23.447475 systemd-logind[1211]: Removed session 5. Dec 13 02:10:23.487300 systemd[1]: Started sshd@6-10.128.0.74:22-139.178.68.195:58268.service. Dec 13 02:10:23.781404 sshd[1406]: Accepted publickey for core from 139.178.68.195 port 58268 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:10:23.783397 sshd[1406]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:10:23.790296 systemd[1]: Started session-6.scope. Dec 13 02:10:23.791108 systemd-logind[1211]: New session 6 of user core. Dec 13 02:10:23.961590 sudo[1410]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 02:10:23.962029 sudo[1410]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:10:23.966727 sudo[1410]: pam_unix(sudo:session): session closed for user root Dec 13 02:10:23.980987 sudo[1409]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 02:10:23.981413 sudo[1409]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:10:23.995283 systemd[1]: Stopping audit-rules.service... Dec 13 02:10:23.997000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 02:10:24.003216 kernel: kauditd_printk_skb: 216 callbacks suppressed Dec 13 02:10:24.003337 kernel: audit: type=1305 audit(1734055823.997:198): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 02:10:24.003385 auditctl[1413]: No rules Dec 13 02:10:24.004347 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 02:10:24.004625 systemd[1]: Stopped audit-rules.service. Dec 13 02:10:24.007546 systemd[1]: Starting audit-rules.service... Dec 13 02:10:23.997000 audit[1413]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd379ac880 a2=420 a3=0 items=0 ppid=1 pid=1413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:24.048609 kernel: audit: type=1300 audit(1734055823.997:198): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd379ac880 a2=420 a3=0 items=0 ppid=1 pid=1413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:24.049771 kernel: audit: type=1327 audit(1734055823.997:198): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 02:10:23.997000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 02:10:24.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:24.063743 augenrules[1430]: No rules Dec 13 02:10:24.065247 systemd[1]: Finished audit-rules.service. Dec 13 02:10:24.067901 sudo[1409]: pam_unix(sudo:session): session closed for user root Dec 13 02:10:24.081379 kernel: audit: type=1131 audit(1734055824.003:199): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:24.081541 kernel: audit: type=1130 audit(1734055824.064:200): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:24.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:24.066000 audit[1409]: USER_END pid=1409 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:10:24.128305 kernel: audit: type=1106 audit(1734055824.066:201): pid=1409 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:10:24.066000 audit[1409]: CRED_DISP pid=1409 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:10:24.130937 sshd[1406]: pam_unix(sshd:session): session closed for user core Dec 13 02:10:24.137324 systemd-logind[1211]: Session 6 logged out. Waiting for processes to exit. Dec 13 02:10:24.139857 systemd[1]: sshd@6-10.128.0.74:22-139.178.68.195:58268.service: Deactivated successfully. Dec 13 02:10:24.140949 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 02:10:24.143101 systemd-logind[1211]: Removed session 6. Dec 13 02:10:24.151159 kernel: audit: type=1104 audit(1734055824.066:202): pid=1409 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:10:24.151291 kernel: audit: type=1106 audit(1734055824.132:203): pid=1406 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:10:24.132000 audit[1406]: USER_END pid=1406 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:10:24.132000 audit[1406]: CRED_DISP pid=1406 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:10:24.234026 kernel: audit: type=1104 audit(1734055824.132:204): pid=1406 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:10:24.234184 kernel: audit: type=1131 audit(1734055824.138:205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.74:22-139.178.68.195:58268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:24.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.74:22-139.178.68.195:58268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:24.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.74:22-139.178.68.195:58284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:24.209657 systemd[1]: Started sshd@7-10.128.0.74:22-139.178.68.195:58284.service. Dec 13 02:10:24.507000 audit[1436]: USER_ACCT pid=1436 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:10:24.508326 sshd[1436]: Accepted publickey for core from 139.178.68.195 port 58284 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:10:24.509000 audit[1436]: CRED_ACQ pid=1436 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:10:24.509000 audit[1436]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffceb75bf00 a2=3 a3=0 items=0 ppid=1 pid=1436 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:24.509000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:10:24.510570 sshd[1436]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:10:24.517333 systemd[1]: Started session-7.scope. Dec 13 02:10:24.518136 systemd-logind[1211]: New session 7 of user core. Dec 13 02:10:24.524000 audit[1436]: USER_START pid=1436 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:10:24.527000 audit[1438]: CRED_ACQ pid=1438 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:10:24.684000 audit[1439]: USER_ACCT pid=1439 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:10:24.686460 sudo[1439]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 02:10:24.685000 audit[1439]: CRED_REFR pid=1439 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:10:24.686938 sudo[1439]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:10:24.687000 audit[1439]: USER_START pid=1439 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:10:24.720039 systemd[1]: Starting docker.service... Dec 13 02:10:24.770733 env[1449]: time="2024-12-13T02:10:24.770598109Z" level=info msg="Starting up" Dec 13 02:10:24.773241 env[1449]: time="2024-12-13T02:10:24.773191499Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 02:10:24.773241 env[1449]: time="2024-12-13T02:10:24.773216828Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 02:10:24.773462 env[1449]: time="2024-12-13T02:10:24.773251469Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 02:10:24.773462 env[1449]: time="2024-12-13T02:10:24.773269529Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 02:10:24.775801 env[1449]: time="2024-12-13T02:10:24.775774576Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 02:10:24.775962 env[1449]: time="2024-12-13T02:10:24.775938998Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 02:10:24.776070 env[1449]: time="2024-12-13T02:10:24.776051889Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 02:10:24.776148 env[1449]: time="2024-12-13T02:10:24.776133429Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 02:10:24.785653 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport2239795828-merged.mount: Deactivated successfully. Dec 13 02:10:24.815951 env[1449]: time="2024-12-13T02:10:24.815902345Z" level=info msg="Loading containers: start." Dec 13 02:10:24.906000 audit[1479]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1479 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:10:24.906000 audit[1479]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffe16101c20 a2=0 a3=7ffe16101c0c items=0 ppid=1449 pid=1479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:24.906000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 02:10:24.910000 audit[1481]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1481 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:10:24.910000 audit[1481]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffce24904c0 a2=0 a3=7ffce24904ac items=0 ppid=1449 pid=1481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:24.910000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 02:10:24.912000 audit[1483]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1483 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:10:24.912000 audit[1483]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd1806bb40 a2=0 a3=7ffd1806bb2c items=0 ppid=1449 pid=1483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:24.912000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 02:10:24.915000 audit[1485]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1485 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:10:24.915000 audit[1485]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd7c2d16c0 a2=0 a3=7ffd7c2d16ac items=0 ppid=1449 pid=1485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:24.915000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 02:10:24.919000 audit[1487]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1487 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:10:24.919000 audit[1487]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcc34793c0 a2=0 a3=7ffcc34793ac items=0 ppid=1449 pid=1487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:24.919000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 02:10:24.942000 audit[1492]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1492 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:10:24.942000 audit[1492]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd9d924cc0 a2=0 a3=7ffd9d924cac items=0 ppid=1449 pid=1492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:24.942000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 02:10:24.947167 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 02:10:24.947488 systemd[1]: Stopped kubelet.service. Dec 13 02:10:24.947602 systemd[1]: kubelet.service: Consumed 1.370s CPU time. Dec 13 02:10:24.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:24.947000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:24.950134 systemd[1]: Starting kubelet.service... Dec 13 02:10:24.960000 audit[1496]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1496 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:10:24.960000 audit[1496]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc77499810 a2=0 a3=7ffc774997fc items=0 ppid=1449 pid=1496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:24.960000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 02:10:24.965000 audit[1498]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1498 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:10:24.965000 audit[1498]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffe499d6850 a2=0 a3=7ffe499d683c items=0 ppid=1449 pid=1498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:24.965000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 02:10:24.971000 audit[1500]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1500 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:10:24.971000 audit[1500]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffcdda48ec0 a2=0 a3=7ffcdda48eac items=0 ppid=1449 pid=1500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:24.971000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:10:25.036000 audit[1504]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1504 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:10:25.036000 audit[1504]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffed4f4d520 a2=0 a3=7ffed4f4d50c items=0 ppid=1449 pid=1504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:25.036000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:10:25.043000 audit[1505]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1505 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:10:25.043000 audit[1505]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffddbde9270 a2=0 a3=7ffddbde925c items=0 ppid=1449 pid=1505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:25.043000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:10:25.064802 kernel: Initializing XFRM netlink socket Dec 13 02:10:25.124799 env[1449]: time="2024-12-13T02:10:25.124736075Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 02:10:25.170000 audit[1513]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1513 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:10:25.170000 audit[1513]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffc9e015220 a2=0 a3=7ffc9e01520c items=0 ppid=1449 pid=1513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:25.170000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 02:10:25.185000 audit[1516]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1516 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:10:25.185000 audit[1516]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffc44299d40 a2=0 a3=7ffc44299d2c items=0 ppid=1449 pid=1516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:25.185000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 02:10:25.189000 audit[1519]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1519 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:10:25.189000 audit[1519]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fffea15c6e0 a2=0 a3=7fffea15c6cc items=0 ppid=1449 pid=1519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:25.189000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 02:10:25.193000 audit[1521]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1521 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:10:25.193000 audit[1521]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe493dd720 a2=0 a3=7ffe493dd70c items=0 ppid=1449 pid=1521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:25.193000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 02:10:25.196000 audit[1523]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1523 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:10:25.196000 audit[1523]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffdc27e5ab0 a2=0 a3=7ffdc27e5a9c items=0 ppid=1449 pid=1523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:25.196000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 02:10:25.199000 audit[1525]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1525 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:10:25.199000 audit[1525]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffd79939340 a2=0 a3=7ffd7993932c items=0 ppid=1449 pid=1525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:25.199000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 02:10:25.202000 audit[1527]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1527 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:10:25.202000 audit[1527]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffc9fd16b40 a2=0 a3=7ffc9fd16b2c items=0 ppid=1449 pid=1527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:25.202000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 02:10:25.217000 audit[1531]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1531 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:10:25.217000 audit[1531]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffc0995ac40 a2=0 a3=7ffc0995ac2c items=0 ppid=1449 pid=1531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:25.217000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 02:10:25.221000 audit[1534]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1534 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:10:25.221000 audit[1534]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffe48ffa450 a2=0 a3=7ffe48ffa43c items=0 ppid=1449 pid=1534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:25.221000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 02:10:25.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:25.222591 systemd[1]: Started kubelet.service. Dec 13 02:10:25.229000 audit[1543]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1543 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:10:25.229000 audit[1543]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffc38def7b0 a2=0 a3=7ffc38def79c items=0 ppid=1449 pid=1543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:25.229000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 02:10:25.235000 audit[1545]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1545 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:10:25.235000 audit[1545]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd001acde0 a2=0 a3=7ffd001acdcc items=0 ppid=1449 pid=1545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:25.235000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 02:10:25.238927 systemd-networkd[1019]: docker0: Link UP Dec 13 02:10:25.257000 audit[1549]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1549 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:10:25.257000 audit[1549]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc01475970 a2=0 a3=7ffc0147595c items=0 ppid=1449 pid=1549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:25.257000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:10:25.266000 audit[1550]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1550 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:10:25.266000 audit[1550]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fffbe2873e0 a2=0 a3=7fffbe2873cc items=0 ppid=1449 pid=1550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:25.266000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:10:25.268220 env[1449]: time="2024-12-13T02:10:25.268178027Z" level=info msg="Loading containers: done." Dec 13 02:10:25.288816 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1189413337-merged.mount: Deactivated successfully. Dec 13 02:10:25.300692 env[1449]: time="2024-12-13T02:10:25.300632050Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 02:10:25.300978 env[1449]: time="2024-12-13T02:10:25.300943187Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 02:10:25.301145 env[1449]: time="2024-12-13T02:10:25.301118190Z" level=info msg="Daemon has completed initialization" Dec 13 02:10:25.311135 kubelet[1535]: E1213 02:10:25.311082 1535 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:10:25.316375 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:10:25.316622 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:10:25.315000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 02:10:25.328176 systemd[1]: Started docker.service. Dec 13 02:10:25.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:25.337012 env[1449]: time="2024-12-13T02:10:25.336921264Z" level=info msg="API listen on /run/docker.sock" Dec 13 02:10:26.386900 env[1220]: time="2024-12-13T02:10:26.386834635Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.4\"" Dec 13 02:10:26.838205 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1801131827.mount: Deactivated successfully. Dec 13 02:10:28.507199 env[1220]: time="2024-12-13T02:10:28.507122449Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:10:28.510067 env[1220]: time="2024-12-13T02:10:28.510017667Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bdc2eadbf366279693097982a31da61cc2f1d90f07ada3f4b3b91251a18f665e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:10:28.513584 env[1220]: time="2024-12-13T02:10:28.513507326Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:10:28.516013 env[1220]: time="2024-12-13T02:10:28.515972709Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:ace6a943b058439bd6daeb74f152e7c36e6fc0b5e481cdff9364cd6ca0473e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:10:28.517151 env[1220]: time="2024-12-13T02:10:28.517100039Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.4\" returns image reference \"sha256:bdc2eadbf366279693097982a31da61cc2f1d90f07ada3f4b3b91251a18f665e\"" Dec 13 02:10:28.519955 env[1220]: time="2024-12-13T02:10:28.519908148Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.4\"" Dec 13 02:10:30.049632 env[1220]: time="2024-12-13T02:10:30.049537020Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:10:30.052626 env[1220]: time="2024-12-13T02:10:30.052551324Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:359b9f2307326a4c66172318ca63ee9792c3146ca57d53329239bd123ea70079,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:10:30.055300 env[1220]: time="2024-12-13T02:10:30.055250055Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:10:30.057792 env[1220]: time="2024-12-13T02:10:30.057738219Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:4bd1d4a449e7a1a4f375bd7c71abf48a95f8949b38f725ded255077329f21f7b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:10:30.059039 env[1220]: time="2024-12-13T02:10:30.058964992Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.4\" returns image reference \"sha256:359b9f2307326a4c66172318ca63ee9792c3146ca57d53329239bd123ea70079\"" Dec 13 02:10:30.059798 env[1220]: time="2024-12-13T02:10:30.059761028Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.4\"" Dec 13 02:10:31.363901 env[1220]: time="2024-12-13T02:10:31.363747387Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:10:31.371787 env[1220]: time="2024-12-13T02:10:31.371725055Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3a66234066fe10fa299c0a52265f90a107450f0372652867118cd9007940d674,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:10:31.377956 env[1220]: time="2024-12-13T02:10:31.377889881Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:10:31.382417 env[1220]: time="2024-12-13T02:10:31.382371215Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:1a3081cb7d21763d22eb2c0781cc462d89f501ed523ad558dea1226f128fbfdd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:10:31.384322 env[1220]: time="2024-12-13T02:10:31.384268360Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.4\" returns image reference \"sha256:3a66234066fe10fa299c0a52265f90a107450f0372652867118cd9007940d674\"" Dec 13 02:10:31.386495 env[1220]: time="2024-12-13T02:10:31.386459896Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\"" Dec 13 02:10:32.512155 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2535582712.mount: Deactivated successfully. Dec 13 02:10:33.285243 env[1220]: time="2024-12-13T02:10:33.285163850Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:10:33.288202 env[1220]: time="2024-12-13T02:10:33.288135028Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ebf80573666f86f115452db568feb34f6f771c3bdc7bfed14b9577f992cfa300,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:10:33.290599 env[1220]: time="2024-12-13T02:10:33.290518828Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:10:33.292619 env[1220]: time="2024-12-13T02:10:33.292547722Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:1739b3febca392035bf6edfe31efdfa55226be7b57389b2001ae357f7dcb99cf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:10:33.293406 env[1220]: time="2024-12-13T02:10:33.293364341Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\" returns image reference \"sha256:ebf80573666f86f115452db568feb34f6f771c3bdc7bfed14b9577f992cfa300\"" Dec 13 02:10:33.294257 env[1220]: time="2024-12-13T02:10:33.294224694Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 02:10:33.717148 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2520933247.mount: Deactivated successfully. Dec 13 02:10:34.933234 env[1220]: time="2024-12-13T02:10:34.933149392Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:10:34.936122 env[1220]: time="2024-12-13T02:10:34.936066826Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:10:34.938760 env[1220]: time="2024-12-13T02:10:34.938718532Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:10:34.941216 env[1220]: time="2024-12-13T02:10:34.941162913Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:10:34.942333 env[1220]: time="2024-12-13T02:10:34.942275810Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Dec 13 02:10:34.943200 env[1220]: time="2024-12-13T02:10:34.943152476Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" Dec 13 02:10:35.320737 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2988721821.mount: Deactivated successfully. Dec 13 02:10:35.322415 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 02:10:35.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:35.322701 systemd[1]: Stopped kubelet.service. Dec 13 02:10:35.350471 kernel: kauditd_printk_skb: 88 callbacks suppressed Dec 13 02:10:35.350651 kernel: audit: type=1130 audit(1734055835.322:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:35.328762 systemd[1]: Starting kubelet.service... Dec 13 02:10:35.322000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:35.371165 env[1220]: time="2024-12-13T02:10:35.370009390Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:10:35.374644 kernel: audit: type=1131 audit(1734055835.322:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:35.383038 env[1220]: time="2024-12-13T02:10:35.382980480Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:10:35.386940 env[1220]: time="2024-12-13T02:10:35.385805987Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:10:35.449920 env[1220]: time="2024-12-13T02:10:35.449856354Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:10:35.452763 env[1220]: time="2024-12-13T02:10:35.452702673Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" Dec 13 02:10:35.453979 env[1220]: time="2024-12-13T02:10:35.453939489Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" Dec 13 02:10:35.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:35.616709 systemd[1]: Started kubelet.service. Dec 13 02:10:35.639672 kernel: audit: type=1130 audit(1734055835.616:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:35.702821 kubelet[1589]: E1213 02:10:35.702774 1589 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:10:35.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 02:10:35.704990 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:10:35.705148 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:10:35.727601 kernel: audit: type=1131 audit(1734055835.704:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 02:10:35.963090 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1897460830.mount: Deactivated successfully. Dec 13 02:10:38.634403 env[1220]: time="2024-12-13T02:10:38.634302121Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:10:38.642684 env[1220]: time="2024-12-13T02:10:38.642629945Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:10:38.645309 env[1220]: time="2024-12-13T02:10:38.645257639Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:10:38.647981 env[1220]: time="2024-12-13T02:10:38.647940234Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:10:38.649019 env[1220]: time="2024-12-13T02:10:38.648967642Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4\"" Dec 13 02:10:42.041009 systemd[1]: Stopped kubelet.service. Dec 13 02:10:42.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:42.044515 systemd[1]: Starting kubelet.service... Dec 13 02:10:42.064763 kernel: audit: type=1130 audit(1734055842.039:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:42.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:42.090593 kernel: audit: type=1131 audit(1734055842.039:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:42.114393 systemd[1]: Reloading. Dec 13 02:10:42.259428 /usr/lib/systemd/system-generators/torcx-generator[1640]: time="2024-12-13T02:10:42Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:10:42.259487 /usr/lib/systemd/system-generators/torcx-generator[1640]: time="2024-12-13T02:10:42Z" level=info msg="torcx already run" Dec 13 02:10:42.384076 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:10:42.384104 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:10:42.409118 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:10:42.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.538965 kernel: audit: type=1400 audit(1734055842.513:250): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.539210 kernel: audit: type=1400 audit(1734055842.513:251): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.559320 kernel: audit: type=1400 audit(1734055842.513:252): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.599729 kernel: audit: type=1400 audit(1734055842.513:253): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.628826 kernel: audit: type=1400 audit(1734055842.513:254): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.628970 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 02:10:42.657281 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 02:10:42.657451 kernel: audit: type=1400 audit(1734055842.513:255): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.555000 audit: BPF prog-id=49 op=LOAD Dec 13 02:10:42.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.576000 audit: BPF prog-id=50 op=LOAD Dec 13 02:10:42.576000 audit: BPF prog-id=30 op=UNLOAD Dec 13 02:10:42.576000 audit: BPF prog-id=31 op=UNLOAD Dec 13 02:10:42.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.597000 audit: BPF prog-id=51 op=LOAD Dec 13 02:10:42.597000 audit: BPF prog-id=39 op=UNLOAD Dec 13 02:10:42.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.600000 audit: BPF prog-id=52 op=LOAD Dec 13 02:10:42.600000 audit: BPF prog-id=44 op=UNLOAD Dec 13 02:10:42.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.600000 audit: BPF prog-id=53 op=LOAD Dec 13 02:10:42.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.600000 audit: BPF prog-id=54 op=LOAD Dec 13 02:10:42.600000 audit: BPF prog-id=45 op=UNLOAD Dec 13 02:10:42.600000 audit: BPF prog-id=46 op=UNLOAD Dec 13 02:10:42.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:42.703325 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 13 02:10:42.702000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:42.723000 audit: BPF prog-id=54 op=UNLOAD Dec 13 02:10:42.723000 audit: BPF prog-id=53 op=UNLOAD Dec 13 02:10:42.723000 audit: BPF prog-id=52 op=UNLOAD Dec 13 02:10:42.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 02:10:42.746707 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Dec 13 02:10:42.746835 systemd[1]: kubelet.service: Failed with result 'signal'. Dec 13 02:10:42.747239 systemd[1]: Stopped kubelet.service. Dec 13 02:10:42.750445 systemd[1]: Starting kubelet.service... Dec 13 02:10:44.214547 systemd[1]: Started kubelet.service. Dec 13 02:10:44.214000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:44.288805 kubelet[1688]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:10:44.288805 kubelet[1688]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 02:10:44.288805 kubelet[1688]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:10:44.289418 kubelet[1688]: I1213 02:10:44.288937 1688 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 02:10:44.999508 kubelet[1688]: I1213 02:10:44.999439 1688 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Dec 13 02:10:44.999508 kubelet[1688]: I1213 02:10:44.999480 1688 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 02:10:44.999932 kubelet[1688]: I1213 02:10:44.999905 1688 server.go:929] "Client rotation is on, will bootstrap in background" Dec 13 02:10:45.081540 kubelet[1688]: I1213 02:10:45.081490 1688 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 02:10:45.082198 kubelet[1688]: E1213 02:10:45.082156 1688 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.128.0.74:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.128.0.74:6443: connect: connection refused" logger="UnhandledError" Dec 13 02:10:45.099276 kubelet[1688]: E1213 02:10:45.099207 1688 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Dec 13 02:10:45.099533 kubelet[1688]: I1213 02:10:45.099494 1688 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Dec 13 02:10:45.105204 kubelet[1688]: I1213 02:10:45.105171 1688 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 02:10:45.105378 kubelet[1688]: I1213 02:10:45.105341 1688 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Dec 13 02:10:45.105634 kubelet[1688]: I1213 02:10:45.105584 1688 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 02:10:45.105921 kubelet[1688]: I1213 02:10:45.105637 1688 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Dec 13 02:10:45.105921 kubelet[1688]: I1213 02:10:45.105917 1688 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 02:10:45.106196 kubelet[1688]: I1213 02:10:45.105938 1688 container_manager_linux.go:300] "Creating device plugin manager" Dec 13 02:10:45.106196 kubelet[1688]: I1213 02:10:45.106108 1688 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:10:45.110710 kubelet[1688]: I1213 02:10:45.110630 1688 kubelet.go:408] "Attempting to sync node with API server" Dec 13 02:10:45.110710 kubelet[1688]: I1213 02:10:45.110714 1688 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 02:10:45.111054 kubelet[1688]: I1213 02:10:45.110861 1688 kubelet.go:314] "Adding apiserver pod source" Dec 13 02:10:45.111054 kubelet[1688]: I1213 02:10:45.110925 1688 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 02:10:45.137032 kubelet[1688]: W1213 02:10:45.136949 1688 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.128.0.74:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.74:6443: connect: connection refused Dec 13 02:10:45.137352 kubelet[1688]: E1213 02:10:45.137318 1688 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.128.0.74:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal&limit=500&resourceVersion=0\": dial tcp 10.128.0.74:6443: connect: connection refused" logger="UnhandledError" Dec 13 02:10:45.141808 kubelet[1688]: W1213 02:10:45.141738 1688 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.128.0.74:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.128.0.74:6443: connect: connection refused Dec 13 02:10:45.142076 kubelet[1688]: E1213 02:10:45.142043 1688 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.128.0.74:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.128.0.74:6443: connect: connection refused" logger="UnhandledError" Dec 13 02:10:45.143770 kubelet[1688]: I1213 02:10:45.143736 1688 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 02:10:45.150351 kubelet[1688]: I1213 02:10:45.150307 1688 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 02:10:45.151938 kubelet[1688]: W1213 02:10:45.151864 1688 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 02:10:45.153154 kubelet[1688]: I1213 02:10:45.153100 1688 server.go:1269] "Started kubelet" Dec 13 02:10:45.153482 kubelet[1688]: I1213 02:10:45.153418 1688 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 02:10:45.154976 kubelet[1688]: I1213 02:10:45.154906 1688 server.go:460] "Adding debug handlers to kubelet server" Dec 13 02:10:45.157000 audit[1688]: AVC avc: denied { mac_admin } for pid=1688 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:45.157000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:10:45.157000 audit[1688]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b54240 a1=c000b5e0c0 a2=c000b54210 a3=25 items=0 ppid=1 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:45.157000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:10:45.158484 kubelet[1688]: I1213 02:10:45.158449 1688 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 02:10:45.158000 audit[1688]: AVC avc: denied { mac_admin } for pid=1688 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:45.158000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:10:45.158000 audit[1688]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008a6f40 a1=c000b5e0d8 a2=c000b542d0 a3=25 items=0 ppid=1 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:45.158000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:10:45.159041 kubelet[1688]: I1213 02:10:45.158921 1688 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 02:10:45.159220 kubelet[1688]: I1213 02:10:45.159191 1688 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 02:10:45.159337 kubelet[1688]: I1213 02:10:45.159311 1688 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 02:10:45.159651 kubelet[1688]: I1213 02:10:45.159628 1688 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 02:10:45.163307 kubelet[1688]: E1213 02:10:45.161261 1688 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.128.0.74:6443/api/v1/namespaces/default/events\": dial tcp 10.128.0.74:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal.18109a9a8f082155 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal,UID:ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal,},FirstTimestamp:2024-12-13 02:10:45.152956757 +0000 UTC m=+0.929341201,LastTimestamp:2024-12-13 02:10:45.152956757 +0000 UTC m=+0.929341201,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal,}" Dec 13 02:10:45.165000 audit[1698]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1698 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:10:45.165000 audit[1698]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd8abdde40 a2=0 a3=7ffd8abdde2c items=0 ppid=1688 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:45.165000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 02:10:45.166661 kubelet[1688]: E1213 02:10:45.166628 1688 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 02:10:45.167023 kubelet[1688]: I1213 02:10:45.166995 1688 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Dec 13 02:10:45.167000 audit[1699]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1699 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:10:45.167000 audit[1699]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc96ab7560 a2=0 a3=7ffc96ab754c items=0 ppid=1688 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:45.167000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 02:10:45.170944 kubelet[1688]: I1213 02:10:45.170923 1688 volume_manager.go:289] "Starting Kubelet Volume Manager" Dec 13 02:10:45.171370 kubelet[1688]: E1213 02:10:45.171346 1688 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal\" not found" Dec 13 02:10:45.172340 kubelet[1688]: I1213 02:10:45.172302 1688 factory.go:221] Registration of the systemd container factory successfully Dec 13 02:10:45.173016 kubelet[1688]: I1213 02:10:45.172460 1688 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 02:10:45.174278 kubelet[1688]: I1213 02:10:45.174257 1688 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Dec 13 02:10:45.174481 kubelet[1688]: I1213 02:10:45.174465 1688 reconciler.go:26] "Reconciler: start to sync state" Dec 13 02:10:45.174000 audit[1701]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1701 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:10:45.174000 audit[1701]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff8aa1f8a0 a2=0 a3=7fff8aa1f88c items=0 ppid=1688 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:45.174000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:10:45.175885 kubelet[1688]: E1213 02:10:45.175836 1688 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.74:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.74:6443: connect: connection refused" interval="200ms" Dec 13 02:10:45.176201 kubelet[1688]: I1213 02:10:45.176163 1688 factory.go:221] Registration of the containerd container factory successfully Dec 13 02:10:45.179000 audit[1703]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1703 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:10:45.179000 audit[1703]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffea7ab44e0 a2=0 a3=7ffea7ab44cc items=0 ppid=1688 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:45.179000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:10:45.187441 kubelet[1688]: W1213 02:10:45.187352 1688 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.128.0.74:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.74:6443: connect: connection refused Dec 13 02:10:45.187639 kubelet[1688]: E1213 02:10:45.187448 1688 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.128.0.74:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.128.0.74:6443: connect: connection refused" logger="UnhandledError" Dec 13 02:10:45.203000 audit[1709]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1709 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:10:45.203000 audit[1709]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc9a4faac0 a2=0 a3=7ffc9a4faaac items=0 ppid=1688 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:45.203000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 02:10:45.204964 kubelet[1688]: I1213 02:10:45.204898 1688 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 02:10:45.206000 audit[1710]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1710 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:10:45.206000 audit[1710]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffac7f4640 a2=0 a3=7fffac7f462c items=0 ppid=1688 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:45.206000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 02:10:45.207157 kubelet[1688]: I1213 02:10:45.207017 1688 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 02:10:45.207157 kubelet[1688]: I1213 02:10:45.207060 1688 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 02:10:45.207157 kubelet[1688]: I1213 02:10:45.207087 1688 kubelet.go:2321] "Starting kubelet main sync loop" Dec 13 02:10:45.207318 kubelet[1688]: E1213 02:10:45.207150 1688 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 02:10:45.208000 audit[1711]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1711 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:10:45.208000 audit[1711]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc68f9a7b0 a2=0 a3=7ffc68f9a79c items=0 ppid=1688 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:45.208000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 02:10:45.210000 audit[1712]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1712 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:10:45.210000 audit[1712]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf0dbb660 a2=0 a3=7ffcf0dbb64c items=0 ppid=1688 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:45.210000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 02:10:45.212000 audit[1713]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1713 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:10:45.212000 audit[1713]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd598dcf50 a2=0 a3=7ffd598dcf3c items=0 ppid=1688 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:45.212000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 02:10:45.214370 kubelet[1688]: W1213 02:10:45.214025 1688 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.128.0.74:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.74:6443: connect: connection refused Dec 13 02:10:45.214370 kubelet[1688]: E1213 02:10:45.214107 1688 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.128.0.74:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.128.0.74:6443: connect: connection refused" logger="UnhandledError" Dec 13 02:10:45.215070 kubelet[1688]: I1213 02:10:45.215036 1688 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 02:10:45.215233 kubelet[1688]: I1213 02:10:45.215215 1688 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 02:10:45.215379 kubelet[1688]: I1213 02:10:45.215363 1688 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:10:45.214000 audit[1714]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1714 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:10:45.214000 audit[1714]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffc0394f20 a2=0 a3=7fffc0394f0c items=0 ppid=1688 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:45.214000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 02:10:45.217000 audit[1716]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1716 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:10:45.217000 audit[1716]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffce346ac70 a2=0 a3=7ffce346ac5c items=0 ppid=1688 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:45.217000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 02:10:45.218833 kubelet[1688]: I1213 02:10:45.218795 1688 policy_none.go:49] "None policy: Start" Dec 13 02:10:45.219905 kubelet[1688]: I1213 02:10:45.219882 1688 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 02:10:45.220055 kubelet[1688]: I1213 02:10:45.220039 1688 state_mem.go:35] "Initializing new in-memory state store" Dec 13 02:10:45.219000 audit[1717]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1717 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:10:45.219000 audit[1717]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff24a7fbe0 a2=0 a3=7fff24a7fbcc items=0 ppid=1688 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:45.219000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 02:10:45.228528 systemd[1]: Created slice kubepods.slice. Dec 13 02:10:45.236600 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 02:10:45.240806 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 02:10:45.247690 kubelet[1688]: I1213 02:10:45.247651 1688 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 02:10:45.247000 audit[1688]: AVC avc: denied { mac_admin } for pid=1688 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:45.247000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:10:45.247000 audit[1688]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0005ffb90 a1=c000b5ec18 a2=c0005ffb60 a3=25 items=0 ppid=1 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:45.247000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:10:45.248177 kubelet[1688]: I1213 02:10:45.247780 1688 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 02:10:45.248177 kubelet[1688]: I1213 02:10:45.247949 1688 eviction_manager.go:189] "Eviction manager: starting control loop" Dec 13 02:10:45.248177 kubelet[1688]: I1213 02:10:45.247967 1688 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 02:10:45.254527 kubelet[1688]: I1213 02:10:45.250993 1688 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 02:10:45.254527 kubelet[1688]: E1213 02:10:45.254319 1688 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal\" not found" Dec 13 02:10:45.328825 systemd[1]: Created slice kubepods-burstable-podee4b1c3e322093b6efff03513f32cb44.slice. Dec 13 02:10:45.345316 systemd[1]: Created slice kubepods-burstable-podc81d115c0b4384878cd15e52103bc5cb.slice. Dec 13 02:10:45.352185 systemd[1]: Created slice kubepods-burstable-pod40f011c1fd0f919c60d3d40bc15aaacd.slice. Dec 13 02:10:45.355535 kubelet[1688]: I1213 02:10:45.355480 1688 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:10:45.356058 kubelet[1688]: E1213 02:10:45.355966 1688 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.128.0.74:6443/api/v1/nodes\": dial tcp 10.128.0.74:6443: connect: connection refused" node="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:10:45.375788 kubelet[1688]: I1213 02:10:45.375724 1688 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/c81d115c0b4384878cd15e52103bc5cb-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal\" (UID: \"c81d115c0b4384878cd15e52103bc5cb\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:10:45.375788 kubelet[1688]: I1213 02:10:45.375782 1688 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/ee4b1c3e322093b6efff03513f32cb44-ca-certs\") pod \"kube-apiserver-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal\" (UID: \"ee4b1c3e322093b6efff03513f32cb44\") " pod="kube-system/kube-apiserver-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:10:45.376052 kubelet[1688]: I1213 02:10:45.375815 1688 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/ee4b1c3e322093b6efff03513f32cb44-k8s-certs\") pod \"kube-apiserver-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal\" (UID: \"ee4b1c3e322093b6efff03513f32cb44\") " pod="kube-system/kube-apiserver-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:10:45.376052 kubelet[1688]: I1213 02:10:45.375842 1688 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/ee4b1c3e322093b6efff03513f32cb44-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal\" (UID: \"ee4b1c3e322093b6efff03513f32cb44\") " pod="kube-system/kube-apiserver-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:10:45.376052 kubelet[1688]: I1213 02:10:45.375872 1688 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/c81d115c0b4384878cd15e52103bc5cb-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal\" (UID: \"c81d115c0b4384878cd15e52103bc5cb\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:10:45.376052 kubelet[1688]: I1213 02:10:45.375896 1688 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/c81d115c0b4384878cd15e52103bc5cb-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal\" (UID: \"c81d115c0b4384878cd15e52103bc5cb\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:10:45.376254 kubelet[1688]: I1213 02:10:45.375923 1688 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/c81d115c0b4384878cd15e52103bc5cb-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal\" (UID: \"c81d115c0b4384878cd15e52103bc5cb\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:10:45.376254 kubelet[1688]: I1213 02:10:45.375949 1688 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/40f011c1fd0f919c60d3d40bc15aaacd-kubeconfig\") pod \"kube-scheduler-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal\" (UID: \"40f011c1fd0f919c60d3d40bc15aaacd\") " pod="kube-system/kube-scheduler-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:10:45.376254 kubelet[1688]: I1213 02:10:45.375975 1688 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/c81d115c0b4384878cd15e52103bc5cb-ca-certs\") pod \"kube-controller-manager-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal\" (UID: \"c81d115c0b4384878cd15e52103bc5cb\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:10:45.376693 kubelet[1688]: E1213 02:10:45.376646 1688 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.74:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.74:6443: connect: connection refused" interval="400ms" Dec 13 02:10:45.564524 kubelet[1688]: I1213 02:10:45.563978 1688 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:10:45.564524 kubelet[1688]: E1213 02:10:45.564429 1688 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.128.0.74:6443/api/v1/nodes\": dial tcp 10.128.0.74:6443: connect: connection refused" node="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:10:45.642728 env[1220]: time="2024-12-13T02:10:45.642667489Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal,Uid:ee4b1c3e322093b6efff03513f32cb44,Namespace:kube-system,Attempt:0,}" Dec 13 02:10:45.650684 env[1220]: time="2024-12-13T02:10:45.650609660Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal,Uid:c81d115c0b4384878cd15e52103bc5cb,Namespace:kube-system,Attempt:0,}" Dec 13 02:10:45.657036 env[1220]: time="2024-12-13T02:10:45.656961653Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal,Uid:40f011c1fd0f919c60d3d40bc15aaacd,Namespace:kube-system,Attempt:0,}" Dec 13 02:10:45.777794 kubelet[1688]: E1213 02:10:45.777732 1688 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.74:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.74:6443: connect: connection refused" interval="800ms" Dec 13 02:10:45.976286 kubelet[1688]: I1213 02:10:45.976246 1688 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:10:45.976717 kubelet[1688]: E1213 02:10:45.976652 1688 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.128.0.74:6443/api/v1/nodes\": dial tcp 10.128.0.74:6443: connect: connection refused" node="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:10:46.036291 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1126516255.mount: Deactivated successfully. Dec 13 02:10:46.054025 env[1220]: time="2024-12-13T02:10:46.053960935Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:10:46.055739 env[1220]: time="2024-12-13T02:10:46.055649112Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:10:46.060374 env[1220]: time="2024-12-13T02:10:46.060318766Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:10:46.061722 env[1220]: time="2024-12-13T02:10:46.061678129Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:10:46.064003 env[1220]: time="2024-12-13T02:10:46.063966878Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:10:46.065160 env[1220]: time="2024-12-13T02:10:46.065104559Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:10:46.066515 env[1220]: time="2024-12-13T02:10:46.066463120Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:10:46.068346 env[1220]: time="2024-12-13T02:10:46.068297885Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:10:46.069203 env[1220]: time="2024-12-13T02:10:46.069149795Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:10:46.070115 env[1220]: time="2024-12-13T02:10:46.070070574Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:10:46.074119 env[1220]: time="2024-12-13T02:10:46.074070183Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:10:46.076452 env[1220]: time="2024-12-13T02:10:46.076406638Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:10:46.125224 env[1220]: time="2024-12-13T02:10:46.125123827Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:10:46.125684 env[1220]: time="2024-12-13T02:10:46.125624351Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:10:46.126014 env[1220]: time="2024-12-13T02:10:46.125954065Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:10:46.126488 env[1220]: time="2024-12-13T02:10:46.126438188Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9c78afb61efd29c633e369c7b1259415c755debaf0feda8f64be3ca3ea879091 pid=1725 runtime=io.containerd.runc.v2 Dec 13 02:10:46.136041 env[1220]: time="2024-12-13T02:10:46.135923997Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:10:46.136316 env[1220]: time="2024-12-13T02:10:46.136278133Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:10:46.136518 env[1220]: time="2024-12-13T02:10:46.136474183Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:10:46.136907 env[1220]: time="2024-12-13T02:10:46.136851456Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/df6b0267f54e3bdb40b86298d206f31080575f00fddfbb851de24b2c6acf0c2b pid=1751 runtime=io.containerd.runc.v2 Dec 13 02:10:46.140045 env[1220]: time="2024-12-13T02:10:46.139961906Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:10:46.140203 env[1220]: time="2024-12-13T02:10:46.140012479Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:10:46.140203 env[1220]: time="2024-12-13T02:10:46.140053675Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:10:46.140360 env[1220]: time="2024-12-13T02:10:46.140299559Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/492d010fe0f1fa8c3b5f155635664c359916d905f15079c23a207da12e4ec612 pid=1759 runtime=io.containerd.runc.v2 Dec 13 02:10:46.168197 systemd[1]: Started cri-containerd-9c78afb61efd29c633e369c7b1259415c755debaf0feda8f64be3ca3ea879091.scope. Dec 13 02:10:46.178770 kubelet[1688]: W1213 02:10:46.177889 1688 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.128.0.74:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.74:6443: connect: connection refused Dec 13 02:10:46.178770 kubelet[1688]: E1213 02:10:46.177966 1688 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.128.0.74:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.128.0.74:6443: connect: connection refused" logger="UnhandledError" Dec 13 02:10:46.182533 systemd[1]: Started cri-containerd-df6b0267f54e3bdb40b86298d206f31080575f00fddfbb851de24b2c6acf0c2b.scope. Dec 13 02:10:46.197725 kubelet[1688]: W1213 02:10:46.197536 1688 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.128.0.74:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.74:6443: connect: connection refused Dec 13 02:10:46.197725 kubelet[1688]: E1213 02:10:46.197669 1688 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.128.0.74:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal&limit=500&resourceVersion=0\": dial tcp 10.128.0.74:6443: connect: connection refused" logger="UnhandledError" Dec 13 02:10:46.210531 systemd[1]: Started cri-containerd-492d010fe0f1fa8c3b5f155635664c359916d905f15079c23a207da12e4ec612.scope. Dec 13 02:10:46.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.222000 audit: BPF prog-id=67 op=LOAD Dec 13 02:10:46.224000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.224000 audit[1775]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1751 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:46.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466366230323637663534653362646234306238363239386432303666 Dec 13 02:10:46.224000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.224000 audit[1775]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1751 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:46.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466366230323637663534653362646234306238363239386432303666 Dec 13 02:10:46.224000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.224000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.224000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.224000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.224000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.224000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.224000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.224000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.224000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.224000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.224000 audit: BPF prog-id=68 op=LOAD Dec 13 02:10:46.224000 audit[1775]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000307460 items=0 ppid=1751 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:46.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466366230323637663534653362646234306238363239386432303666 Dec 13 02:10:46.228000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.228000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.228000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.228000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.228000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.228000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.228000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.228000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.228000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.228000 audit: BPF prog-id=69 op=LOAD Dec 13 02:10:46.228000 audit[1775]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003074a8 items=0 ppid=1751 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:46.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466366230323637663534653362646234306238363239386432303666 Dec 13 02:10:46.229000 audit: BPF prog-id=69 op=UNLOAD Dec 13 02:10:46.229000 audit: BPF prog-id=68 op=UNLOAD Dec 13 02:10:46.229000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.229000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.229000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.229000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.229000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.229000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.229000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.229000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.229000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.234000 audit: BPF prog-id=70 op=LOAD Dec 13 02:10:46.235000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.235000 audit[1757]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1725 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:46.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963373861666236316566643239633633336533363963376231323539 Dec 13 02:10:46.235000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.235000 audit[1757]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1725 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:46.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963373861666236316566643239633633336533363963376231323539 Dec 13 02:10:46.235000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.235000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.235000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.235000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.235000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.235000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.235000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.235000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.235000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.235000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.235000 audit: BPF prog-id=71 op=LOAD Dec 13 02:10:46.235000 audit[1757]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002196a0 items=0 ppid=1725 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:46.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963373861666236316566643239633633336533363963376231323539 Dec 13 02:10:46.235000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.235000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.235000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.235000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.235000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.235000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.235000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.235000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.235000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.235000 audit: BPF prog-id=72 op=LOAD Dec 13 02:10:46.235000 audit[1757]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002196e8 items=0 ppid=1725 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:46.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963373861666236316566643239633633336533363963376231323539 Dec 13 02:10:46.235000 audit: BPF prog-id=72 op=UNLOAD Dec 13 02:10:46.236000 audit: BPF prog-id=71 op=UNLOAD Dec 13 02:10:46.236000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.236000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.236000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.236000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.236000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.236000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.236000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.236000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.236000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.236000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.236000 audit: BPF prog-id=73 op=LOAD Dec 13 02:10:46.236000 audit[1757]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000219af8 items=0 ppid=1725 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:46.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963373861666236316566643239633633336533363963376231323539 Dec 13 02:10:46.229000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.229000 audit: BPF prog-id=74 op=LOAD Dec 13 02:10:46.229000 audit[1775]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003078b8 items=0 ppid=1751 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:46.229000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466366230323637663534653362646234306238363239386432303666 Dec 13 02:10:46.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.249000 audit: BPF prog-id=75 op=LOAD Dec 13 02:10:46.250000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.250000 audit[1785]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1759 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:46.250000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439326430313066653066316661386333623566313535363335363634 Dec 13 02:10:46.251000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.251000 audit[1785]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1759 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:46.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439326430313066653066316661386333623566313535363335363634 Dec 13 02:10:46.251000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.251000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.251000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.251000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.251000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.251000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.251000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.251000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.251000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.251000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.251000 audit: BPF prog-id=76 op=LOAD Dec 13 02:10:46.251000 audit[1785]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002a5a50 items=0 ppid=1759 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:46.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439326430313066653066316661386333623566313535363335363634 Dec 13 02:10:46.252000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.252000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.252000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.252000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.252000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.252000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.252000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.252000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.252000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.252000 audit: BPF prog-id=77 op=LOAD Dec 13 02:10:46.252000 audit[1785]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002a5a98 items=0 ppid=1759 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:46.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439326430313066653066316661386333623566313535363335363634 Dec 13 02:10:46.253000 audit: BPF prog-id=77 op=UNLOAD Dec 13 02:10:46.253000 audit: BPF prog-id=76 op=UNLOAD Dec 13 02:10:46.253000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.253000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.253000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.253000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.253000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.253000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.253000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.253000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.253000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.253000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.253000 audit: BPF prog-id=78 op=LOAD Dec 13 02:10:46.253000 audit[1785]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002a5ea8 items=0 ppid=1759 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:46.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439326430313066653066316661386333623566313535363335363634 Dec 13 02:10:46.305505 env[1220]: time="2024-12-13T02:10:46.305450853Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal,Uid:ee4b1c3e322093b6efff03513f32cb44,Namespace:kube-system,Attempt:0,} returns sandbox id \"492d010fe0f1fa8c3b5f155635664c359916d905f15079c23a207da12e4ec612\"" Dec 13 02:10:46.309949 kubelet[1688]: E1213 02:10:46.309393 1688 kubelet_pods.go:538] "Hostname for pod was too long, truncated it" podName="kube-apiserver-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-apiserver-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-21291" Dec 13 02:10:46.311764 env[1220]: time="2024-12-13T02:10:46.311713894Z" level=info msg="CreateContainer within sandbox \"492d010fe0f1fa8c3b5f155635664c359916d905f15079c23a207da12e4ec612\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 02:10:46.333146 env[1220]: time="2024-12-13T02:10:46.333055236Z" level=info msg="CreateContainer within sandbox \"492d010fe0f1fa8c3b5f155635664c359916d905f15079c23a207da12e4ec612\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"1232a62b34fd548a85f860c34ed284d3b057d3cf5152279e6334adba2913922d\"" Dec 13 02:10:46.333999 env[1220]: time="2024-12-13T02:10:46.333947822Z" level=info msg="StartContainer for \"1232a62b34fd548a85f860c34ed284d3b057d3cf5152279e6334adba2913922d\"" Dec 13 02:10:46.342175 env[1220]: time="2024-12-13T02:10:46.342116115Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal,Uid:c81d115c0b4384878cd15e52103bc5cb,Namespace:kube-system,Attempt:0,} returns sandbox id \"df6b0267f54e3bdb40b86298d206f31080575f00fddfbb851de24b2c6acf0c2b\"" Dec 13 02:10:46.346414 kubelet[1688]: E1213 02:10:46.345879 1688 kubelet_pods.go:538] "Hostname for pod was too long, truncated it" podName="kube-controller-manager-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-controller-manager-ci-3510-3-6-d705eaa12197eac35354.c.flat" Dec 13 02:10:46.347693 env[1220]: time="2024-12-13T02:10:46.347648122Z" level=info msg="CreateContainer within sandbox \"df6b0267f54e3bdb40b86298d206f31080575f00fddfbb851de24b2c6acf0c2b\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 02:10:46.363276 env[1220]: time="2024-12-13T02:10:46.363199192Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal,Uid:40f011c1fd0f919c60d3d40bc15aaacd,Namespace:kube-system,Attempt:0,} returns sandbox id \"9c78afb61efd29c633e369c7b1259415c755debaf0feda8f64be3ca3ea879091\"" Dec 13 02:10:46.364954 kubelet[1688]: E1213 02:10:46.364900 1688 kubelet_pods.go:538] "Hostname for pod was too long, truncated it" podName="kube-scheduler-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-scheduler-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-21291" Dec 13 02:10:46.366645 env[1220]: time="2024-12-13T02:10:46.366605880Z" level=info msg="CreateContainer within sandbox \"9c78afb61efd29c633e369c7b1259415c755debaf0feda8f64be3ca3ea879091\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 02:10:46.377808 env[1220]: time="2024-12-13T02:10:46.377750647Z" level=info msg="CreateContainer within sandbox \"df6b0267f54e3bdb40b86298d206f31080575f00fddfbb851de24b2c6acf0c2b\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"0f6fd3ed47b167a872360ddb6195c1a3e5f0e0a68ecb4fc4952b1901b97224ed\"" Dec 13 02:10:46.378660 env[1220]: time="2024-12-13T02:10:46.378621979Z" level=info msg="StartContainer for \"0f6fd3ed47b167a872360ddb6195c1a3e5f0e0a68ecb4fc4952b1901b97224ed\"" Dec 13 02:10:46.389542 env[1220]: time="2024-12-13T02:10:46.389488573Z" level=info msg="CreateContainer within sandbox \"9c78afb61efd29c633e369c7b1259415c755debaf0feda8f64be3ca3ea879091\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"5335a8d3531445a964811994fa396c67d912f871b3dcf77abfa8429f139055ad\"" Dec 13 02:10:46.390430 env[1220]: time="2024-12-13T02:10:46.390394758Z" level=info msg="StartContainer for \"5335a8d3531445a964811994fa396c67d912f871b3dcf77abfa8429f139055ad\"" Dec 13 02:10:46.395649 systemd[1]: Started cri-containerd-1232a62b34fd548a85f860c34ed284d3b057d3cf5152279e6334adba2913922d.scope. Dec 13 02:10:46.432834 systemd[1]: Started cri-containerd-0f6fd3ed47b167a872360ddb6195c1a3e5f0e0a68ecb4fc4952b1901b97224ed.scope. Dec 13 02:10:46.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.440000 audit: BPF prog-id=79 op=LOAD Dec 13 02:10:46.441000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.441000 audit[1853]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1759 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:46.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132333261363262333466643534386138356638363063333465643238 Dec 13 02:10:46.441000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.441000 audit[1853]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1759 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:46.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132333261363262333466643534386138356638363063333465643238 Dec 13 02:10:46.442000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.442000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.442000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.442000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.442000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.442000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.442000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.442000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.442000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.442000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.442000 audit: BPF prog-id=80 op=LOAD Dec 13 02:10:46.442000 audit[1853]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001991e0 items=0 ppid=1759 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:46.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132333261363262333466643534386138356638363063333465643238 Dec 13 02:10:46.444000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.444000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.444000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.444000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.444000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.444000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.444000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.444000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.444000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.444000 audit: BPF prog-id=81 op=LOAD Dec 13 02:10:46.444000 audit[1853]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000199228 items=0 ppid=1759 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:46.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132333261363262333466643534386138356638363063333465643238 Dec 13 02:10:46.445000 audit: BPF prog-id=81 op=UNLOAD Dec 13 02:10:46.445000 audit: BPF prog-id=80 op=UNLOAD Dec 13 02:10:46.445000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.445000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.445000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.445000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.445000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.445000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.445000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.445000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.445000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.445000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.445000 audit: BPF prog-id=82 op=LOAD Dec 13 02:10:46.445000 audit[1853]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000199638 items=0 ppid=1759 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:46.445000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132333261363262333466643534386138356638363063333465643238 Dec 13 02:10:46.470434 systemd[1]: Started cri-containerd-5335a8d3531445a964811994fa396c67d912f871b3dcf77abfa8429f139055ad.scope. Dec 13 02:10:46.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.478000 audit: BPF prog-id=83 op=LOAD Dec 13 02:10:46.481000 audit[1882]: AVC avc: denied { bpf } for pid=1882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.481000 audit[1882]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1751 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:46.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066366664336564343762313637613837323336306464623631393563 Dec 13 02:10:46.482000 audit[1882]: AVC avc: denied { perfmon } for pid=1882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.482000 audit[1882]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1751 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:46.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066366664336564343762313637613837323336306464623631393563 Dec 13 02:10:46.483000 audit[1882]: AVC avc: denied { bpf } for pid=1882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.483000 audit[1882]: AVC avc: denied { bpf } for pid=1882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.483000 audit[1882]: AVC avc: denied { bpf } for pid=1882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.483000 audit[1882]: AVC avc: denied { perfmon } for pid=1882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.483000 audit[1882]: AVC avc: denied { perfmon } for pid=1882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.483000 audit[1882]: AVC avc: denied { perfmon } for pid=1882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.483000 audit[1882]: AVC avc: denied { perfmon } for pid=1882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.483000 audit[1882]: AVC avc: denied { perfmon } for pid=1882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.483000 audit[1882]: AVC avc: denied { bpf } for pid=1882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.483000 audit[1882]: AVC avc: denied { bpf } for pid=1882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.483000 audit: BPF prog-id=84 op=LOAD Dec 13 02:10:46.483000 audit[1882]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025790 items=0 ppid=1751 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:46.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066366664336564343762313637613837323336306464623631393563 Dec 13 02:10:46.487000 audit[1882]: AVC avc: denied { bpf } for pid=1882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.487000 audit[1882]: AVC avc: denied { bpf } for pid=1882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.487000 audit[1882]: AVC avc: denied { perfmon } for pid=1882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.487000 audit[1882]: AVC avc: denied { perfmon } for pid=1882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.487000 audit[1882]: AVC avc: denied { perfmon } for pid=1882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.487000 audit[1882]: AVC avc: denied { perfmon } for pid=1882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.487000 audit[1882]: AVC avc: denied { perfmon } for pid=1882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.487000 audit[1882]: AVC avc: denied { bpf } for pid=1882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.487000 audit[1882]: AVC avc: denied { bpf } for pid=1882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.487000 audit: BPF prog-id=85 op=LOAD Dec 13 02:10:46.487000 audit[1882]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000257d8 items=0 ppid=1751 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:46.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066366664336564343762313637613837323336306464623631393563 Dec 13 02:10:46.494000 audit: BPF prog-id=85 op=UNLOAD Dec 13 02:10:46.494000 audit: BPF prog-id=84 op=UNLOAD Dec 13 02:10:46.494000 audit[1882]: AVC avc: denied { bpf } for pid=1882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.494000 audit[1882]: AVC avc: denied { bpf } for pid=1882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.494000 audit[1882]: AVC avc: denied { bpf } for pid=1882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.494000 audit[1882]: AVC avc: denied { perfmon } for pid=1882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.494000 audit[1882]: AVC avc: denied { perfmon } for pid=1882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.494000 audit[1882]: AVC avc: denied { perfmon } for pid=1882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.494000 audit[1882]: AVC avc: denied { perfmon } for pid=1882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.494000 audit[1882]: AVC avc: denied { perfmon } for pid=1882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.494000 audit[1882]: AVC avc: denied { bpf } for pid=1882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.494000 audit[1882]: AVC avc: denied { bpf } for pid=1882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.494000 audit: BPF prog-id=86 op=LOAD Dec 13 02:10:46.494000 audit[1882]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025be8 items=0 ppid=1751 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:46.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066366664336564343762313637613837323336306464623631393563 Dec 13 02:10:46.542687 env[1220]: time="2024-12-13T02:10:46.542624996Z" level=info msg="StartContainer for \"1232a62b34fd548a85f860c34ed284d3b057d3cf5152279e6334adba2913922d\" returns successfully" Dec 13 02:10:46.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.548000 audit: BPF prog-id=87 op=LOAD Dec 13 02:10:46.561000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.561000 audit[1897]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1725 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:46.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533333561386433353331343435613936343831313939346661333936 Dec 13 02:10:46.562000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.562000 audit[1897]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1725 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:46.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533333561386433353331343435613936343831313939346661333936 Dec 13 02:10:46.562000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.562000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.562000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.562000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.562000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.562000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.562000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.562000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.562000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.562000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.562000 audit: BPF prog-id=88 op=LOAD Dec 13 02:10:46.562000 audit[1897]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000368600 items=0 ppid=1725 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:46.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533333561386433353331343435613936343831313939346661333936 Dec 13 02:10:46.563000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.563000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.563000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.563000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.563000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.563000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.563000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.563000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.563000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.563000 audit: BPF prog-id=89 op=LOAD Dec 13 02:10:46.563000 audit[1897]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000368648 items=0 ppid=1725 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:46.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533333561386433353331343435613936343831313939346661333936 Dec 13 02:10:46.565000 audit: BPF prog-id=89 op=UNLOAD Dec 13 02:10:46.565000 audit: BPF prog-id=88 op=UNLOAD Dec 13 02:10:46.565000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.565000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.565000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.565000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.565000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.565000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.565000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.565000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.565000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.565000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:46.565000 audit: BPF prog-id=90 op=LOAD Dec 13 02:10:46.565000 audit[1897]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000368a58 items=0 ppid=1725 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:46.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533333561386433353331343435613936343831313939346661333936 Dec 13 02:10:46.579315 kubelet[1688]: E1213 02:10:46.579238 1688 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.74:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.74:6443: connect: connection refused" interval="1.6s" Dec 13 02:10:46.583447 env[1220]: time="2024-12-13T02:10:46.583382005Z" level=info msg="StartContainer for \"0f6fd3ed47b167a872360ddb6195c1a3e5f0e0a68ecb4fc4952b1901b97224ed\" returns successfully" Dec 13 02:10:46.654231 env[1220]: time="2024-12-13T02:10:46.654171922Z" level=info msg="StartContainer for \"5335a8d3531445a964811994fa396c67d912f871b3dcf77abfa8429f139055ad\" returns successfully" Dec 13 02:10:46.788302 kubelet[1688]: I1213 02:10:46.788172 1688 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:10:50.154000 audit[1874]: AVC avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7318 scontext=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:10:50.160456 kernel: kauditd_printk_skb: 862 callbacks suppressed Dec 13 02:10:50.160607 kernel: audit: type=1400 audit(1734055850.154:451): avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7318 scontext=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:10:50.154000 audit[1874]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c008290cf0 a2=fc6 a3=0 items=0 ppid=1759 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 key=(null) Dec 13 02:10:50.232591 kernel: audit: type=1300 audit(1734055850.154:451): arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c008290cf0 a2=fc6 a3=0 items=0 ppid=1759 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 key=(null) Dec 13 02:10:50.154000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3734002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:10:50.278589 kernel: audit: type=1327 audit(1734055850.154:451): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3734002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:10:50.186000 audit[1874]: AVC avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:10:50.186000 audit[1874]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c008290d20 a2=fc6 a3=0 items=0 ppid=1759 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 key=(null) Dec 13 02:10:50.345516 kernel: audit: type=1400 audit(1734055850.186:452): avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:10:50.345695 kernel: audit: type=1300 audit(1734055850.186:452): arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c008290d20 a2=fc6 a3=0 items=0 ppid=1759 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 key=(null) Dec 13 02:10:50.345748 kernel: audit: type=1327 audit(1734055850.186:452): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3734002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:10:50.186000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3734002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:10:50.191000 audit[1874]: AVC avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:10:50.438803 kernel: audit: type=1400 audit(1734055850.191:453): avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:10:50.438955 kernel: audit: type=1300 audit(1734055850.191:453): arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c0013a7200 a2=fc6 a3=0 items=0 ppid=1759 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 key=(null) Dec 13 02:10:50.191000 audit[1874]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c0013a7200 a2=fc6 a3=0 items=0 ppid=1759 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 key=(null) Dec 13 02:10:50.191000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3734002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:10:50.474715 kernel: audit: type=1327 audit(1734055850.191:453): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3734002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:10:50.236000 audit[1874]: AVC avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7320 scontext=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:10:50.502588 kernel: audit: type=1400 audit(1734055850.236:454): avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7320 scontext=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:10:50.236000 audit[1874]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c00391d410 a2=fc6 a3=0 items=0 ppid=1759 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 key=(null) Dec 13 02:10:50.236000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3734002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:10:50.242000 audit[1874]: AVC avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:10:50.242000 audit[1874]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c0013a7e60 a2=fc6 a3=0 items=0 ppid=1759 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 key=(null) Dec 13 02:10:50.242000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3734002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:10:50.242000 audit[1874]: AVC avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7318 scontext=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:10:50.242000 audit[1874]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c006c4dda0 a2=fc6 a3=0 items=0 ppid=1759 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 key=(null) Dec 13 02:10:50.242000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3734002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:10:50.708085 kubelet[1688]: E1213 02:10:50.707994 1688 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal\" not found" node="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:10:50.858082 kubelet[1688]: I1213 02:10:50.858037 1688 kubelet_node_status.go:75] "Successfully registered node" node="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:10:50.869608 kubelet[1688]: E1213 02:10:50.869461 1688 event.go:359] "Server rejected event (will not retry!)" err="namespaces \"default\" not found" event="&Event{ObjectMeta:{ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal.18109a9a8f082155 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal,UID:ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal,},FirstTimestamp:2024-12-13 02:10:45.152956757 +0000 UTC m=+0.929341201,LastTimestamp:2024-12-13 02:10:45.152956757 +0000 UTC m=+0.929341201,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal,}" Dec 13 02:10:50.949127 kubelet[1688]: E1213 02:10:50.948938 1688 event.go:359] "Server rejected event (will not retry!)" err="namespaces \"default\" not found" event="&Event{ObjectMeta:{ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal.18109a9a8fd86a47 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal,UID:ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal,},FirstTimestamp:2024-12-13 02:10:45.166606919 +0000 UTC m=+0.942991363,LastTimestamp:2024-12-13 02:10:45.166606919 +0000 UTC m=+0.942991363,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal,}" Dec 13 02:10:51.141124 kubelet[1688]: I1213 02:10:51.140994 1688 apiserver.go:52] "Watching apiserver" Dec 13 02:10:51.175251 kubelet[1688]: I1213 02:10:51.175191 1688 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Dec 13 02:10:51.688000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7318 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:10:51.688000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000ce6600 a2=fc6 a3=0 items=0 ppid=1751 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 key=(null) Dec 13 02:10:51.688000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:10:51.689000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:10:51.689000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00090c8c0 a2=fc6 a3=0 items=0 ppid=1751 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 key=(null) Dec 13 02:10:51.689000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:10:52.714513 systemd[1]: Reloading. Dec 13 02:10:52.829060 /usr/lib/systemd/system-generators/torcx-generator[1983]: time="2024-12-13T02:10:52Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:10:52.829111 /usr/lib/systemd/system-generators/torcx-generator[1983]: time="2024-12-13T02:10:52Z" level=info msg="torcx already run" Dec 13 02:10:52.941168 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:10:52.941196 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:10:52.970861 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:10:53.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.086000 audit: BPF prog-id=91 op=LOAD Dec 13 02:10:53.087000 audit: BPF prog-id=83 op=UNLOAD Dec 13 02:10:53.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.091000 audit: BPF prog-id=92 op=LOAD Dec 13 02:10:53.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.092000 audit: BPF prog-id=93 op=LOAD Dec 13 02:10:53.092000 audit: BPF prog-id=49 op=UNLOAD Dec 13 02:10:53.092000 audit: BPF prog-id=50 op=UNLOAD Dec 13 02:10:53.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.094000 audit: BPF prog-id=94 op=LOAD Dec 13 02:10:53.094000 audit: BPF prog-id=51 op=UNLOAD Dec 13 02:10:53.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.096000 audit: BPF prog-id=95 op=LOAD Dec 13 02:10:53.096000 audit: BPF prog-id=55 op=UNLOAD Dec 13 02:10:53.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.096000 audit: BPF prog-id=96 op=LOAD Dec 13 02:10:53.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.097000 audit: BPF prog-id=97 op=LOAD Dec 13 02:10:53.097000 audit: BPF prog-id=56 op=UNLOAD Dec 13 02:10:53.097000 audit: BPF prog-id=57 op=UNLOAD Dec 13 02:10:53.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.097000 audit: BPF prog-id=98 op=LOAD Dec 13 02:10:53.097000 audit: BPF prog-id=70 op=UNLOAD Dec 13 02:10:53.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.098000 audit: BPF prog-id=99 op=LOAD Dec 13 02:10:53.098000 audit: BPF prog-id=58 op=UNLOAD Dec 13 02:10:53.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.099000 audit: BPF prog-id=100 op=LOAD Dec 13 02:10:53.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.099000 audit: BPF prog-id=101 op=LOAD Dec 13 02:10:53.099000 audit: BPF prog-id=59 op=UNLOAD Dec 13 02:10:53.099000 audit: BPF prog-id=60 op=UNLOAD Dec 13 02:10:53.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.102000 audit: BPF prog-id=102 op=LOAD Dec 13 02:10:53.102000 audit: BPF prog-id=87 op=UNLOAD Dec 13 02:10:53.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.103000 audit: BPF prog-id=103 op=LOAD Dec 13 02:10:53.103000 audit: BPF prog-id=67 op=UNLOAD Dec 13 02:10:53.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.104000 audit: BPF prog-id=104 op=LOAD Dec 13 02:10:53.104000 audit: BPF prog-id=75 op=UNLOAD Dec 13 02:10:53.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.106000 audit: BPF prog-id=105 op=LOAD Dec 13 02:10:53.106000 audit: BPF prog-id=61 op=UNLOAD Dec 13 02:10:53.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.107000 audit: BPF prog-id=106 op=LOAD Dec 13 02:10:53.107000 audit: BPF prog-id=62 op=UNLOAD Dec 13 02:10:53.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.109000 audit: BPF prog-id=107 op=LOAD Dec 13 02:10:53.109000 audit: BPF prog-id=79 op=UNLOAD Dec 13 02:10:53.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.112000 audit: BPF prog-id=108 op=LOAD Dec 13 02:10:53.112000 audit: BPF prog-id=63 op=UNLOAD Dec 13 02:10:53.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.114000 audit: BPF prog-id=109 op=LOAD Dec 13 02:10:53.114000 audit: BPF prog-id=64 op=UNLOAD Dec 13 02:10:53.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.114000 audit: BPF prog-id=110 op=LOAD Dec 13 02:10:53.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.114000 audit: BPF prog-id=111 op=LOAD Dec 13 02:10:53.114000 audit: BPF prog-id=65 op=UNLOAD Dec 13 02:10:53.114000 audit: BPF prog-id=66 op=UNLOAD Dec 13 02:10:53.139387 systemd[1]: Stopping kubelet.service... Dec 13 02:10:53.162000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:53.163019 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 02:10:53.163272 systemd[1]: Stopped kubelet.service. Dec 13 02:10:53.163359 systemd[1]: kubelet.service: Consumed 1.382s CPU time. Dec 13 02:10:53.166230 systemd[1]: Starting kubelet.service... Dec 13 02:10:53.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:10:53.387128 systemd[1]: Started kubelet.service. Dec 13 02:10:53.482126 kubelet[2032]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:10:53.482670 kubelet[2032]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 02:10:53.482758 kubelet[2032]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:10:53.482918 kubelet[2032]: I1213 02:10:53.482889 2032 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 02:10:53.493388 kubelet[2032]: I1213 02:10:53.493351 2032 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Dec 13 02:10:53.493591 kubelet[2032]: I1213 02:10:53.493549 2032 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 02:10:53.494109 kubelet[2032]: I1213 02:10:53.494088 2032 server.go:929] "Client rotation is on, will bootstrap in background" Dec 13 02:10:53.495750 kubelet[2032]: I1213 02:10:53.495725 2032 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 02:10:53.497912 kubelet[2032]: I1213 02:10:53.497894 2032 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 02:10:53.504911 kubelet[2032]: E1213 02:10:53.504856 2032 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Dec 13 02:10:53.505143 kubelet[2032]: I1213 02:10:53.505123 2032 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Dec 13 02:10:53.509058 kubelet[2032]: I1213 02:10:53.509009 2032 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 02:10:53.509219 kubelet[2032]: I1213 02:10:53.509184 2032 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Dec 13 02:10:53.509417 kubelet[2032]: I1213 02:10:53.509375 2032 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 02:10:53.510065 kubelet[2032]: I1213 02:10:53.509409 2032 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Dec 13 02:10:53.510266 kubelet[2032]: I1213 02:10:53.510079 2032 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 02:10:53.510266 kubelet[2032]: I1213 02:10:53.510097 2032 container_manager_linux.go:300] "Creating device plugin manager" Dec 13 02:10:53.510266 kubelet[2032]: I1213 02:10:53.510144 2032 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:10:53.510434 kubelet[2032]: I1213 02:10:53.510298 2032 kubelet.go:408] "Attempting to sync node with API server" Dec 13 02:10:53.510434 kubelet[2032]: I1213 02:10:53.510317 2032 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 02:10:53.510434 kubelet[2032]: I1213 02:10:53.510358 2032 kubelet.go:314] "Adding apiserver pod source" Dec 13 02:10:53.510434 kubelet[2032]: I1213 02:10:53.510379 2032 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 02:10:53.511195 kubelet[2032]: I1213 02:10:53.511171 2032 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 02:10:53.512159 kubelet[2032]: I1213 02:10:53.512136 2032 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 02:10:53.512858 kubelet[2032]: I1213 02:10:53.512838 2032 server.go:1269] "Started kubelet" Dec 13 02:10:53.515000 audit[2032]: AVC avc: denied { mac_admin } for pid=2032 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.515000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:10:53.515000 audit[2032]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b3dbc0 a1=c0008ab8c0 a2=c000b3db90 a3=25 items=0 ppid=1 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:53.515000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:10:53.515000 audit[2032]: AVC avc: denied { mac_admin } for pid=2032 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.515000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:10:53.515000 audit[2032]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0003b5640 a1=c0008ab8d8 a2=c000b3dc50 a3=25 items=0 ppid=1 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:53.515000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:10:53.516771 kubelet[2032]: I1213 02:10:53.516064 2032 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 02:10:53.516771 kubelet[2032]: I1213 02:10:53.516123 2032 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 02:10:53.516771 kubelet[2032]: I1213 02:10:53.516166 2032 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 02:10:53.524473 kubelet[2032]: I1213 02:10:53.524414 2032 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 02:10:53.526184 kubelet[2032]: I1213 02:10:53.526161 2032 server.go:460] "Adding debug handlers to kubelet server" Dec 13 02:10:53.528274 kubelet[2032]: I1213 02:10:53.528200 2032 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 02:10:53.528678 kubelet[2032]: I1213 02:10:53.528660 2032 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 02:10:53.529091 kubelet[2032]: I1213 02:10:53.529072 2032 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Dec 13 02:10:53.535693 kubelet[2032]: I1213 02:10:53.535662 2032 volume_manager.go:289] "Starting Kubelet Volume Manager" Dec 13 02:10:53.536457 kubelet[2032]: E1213 02:10:53.536415 2032 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal\" not found" Dec 13 02:10:53.536832 kubelet[2032]: I1213 02:10:53.536802 2032 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Dec 13 02:10:53.537023 kubelet[2032]: I1213 02:10:53.537002 2032 reconciler.go:26] "Reconciler: start to sync state" Dec 13 02:10:53.545681 kubelet[2032]: I1213 02:10:53.545631 2032 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 02:10:53.547770 kubelet[2032]: I1213 02:10:53.547744 2032 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 02:10:53.548059 kubelet[2032]: I1213 02:10:53.548043 2032 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 02:10:53.548183 kubelet[2032]: I1213 02:10:53.548160 2032 kubelet.go:2321] "Starting kubelet main sync loop" Dec 13 02:10:53.548335 kubelet[2032]: E1213 02:10:53.548314 2032 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 02:10:53.564587 kubelet[2032]: I1213 02:10:53.564529 2032 factory.go:221] Registration of the systemd container factory successfully Dec 13 02:10:53.564915 kubelet[2032]: I1213 02:10:53.564886 2032 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 02:10:53.567271 kubelet[2032]: I1213 02:10:53.567247 2032 factory.go:221] Registration of the containerd container factory successfully Dec 13 02:10:53.632537 kubelet[2032]: I1213 02:10:53.632488 2032 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 02:10:53.632537 kubelet[2032]: I1213 02:10:53.632512 2032 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 02:10:53.632537 kubelet[2032]: I1213 02:10:53.632539 2032 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:10:53.632855 kubelet[2032]: I1213 02:10:53.632812 2032 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 02:10:53.632855 kubelet[2032]: I1213 02:10:53.632831 2032 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 02:10:53.632952 kubelet[2032]: I1213 02:10:53.632860 2032 policy_none.go:49] "None policy: Start" Dec 13 02:10:53.633774 kubelet[2032]: I1213 02:10:53.633750 2032 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 02:10:53.633887 kubelet[2032]: I1213 02:10:53.633783 2032 state_mem.go:35] "Initializing new in-memory state store" Dec 13 02:10:53.634097 kubelet[2032]: I1213 02:10:53.634060 2032 state_mem.go:75] "Updated machine memory state" Dec 13 02:10:53.639000 audit[2032]: AVC avc: denied { mac_admin } for pid=2032 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:10:53.639000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:10:53.639000 audit[2032]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000aa63f0 a1=c000595ec0 a2=c000aa63c0 a3=25 items=0 ppid=1 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:10:53.639000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:10:53.644320 kubelet[2032]: I1213 02:10:53.639801 2032 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 02:10:53.644320 kubelet[2032]: I1213 02:10:53.639952 2032 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 02:10:53.644320 kubelet[2032]: I1213 02:10:53.640189 2032 eviction_manager.go:189] "Eviction manager: starting control loop" Dec 13 02:10:53.644320 kubelet[2032]: I1213 02:10:53.640206 2032 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 02:10:53.644320 kubelet[2032]: I1213 02:10:53.640993 2032 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 02:10:53.666251 kubelet[2032]: W1213 02:10:53.666215 2032 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Dec 13 02:10:53.668285 kubelet[2032]: W1213 02:10:53.668255 2032 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Dec 13 02:10:53.668765 kubelet[2032]: W1213 02:10:53.668742 2032 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Dec 13 02:10:53.760274 kubelet[2032]: I1213 02:10:53.760143 2032 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:10:53.774713 kubelet[2032]: I1213 02:10:53.774158 2032 kubelet_node_status.go:111] "Node was previously registered" node="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:10:53.774713 kubelet[2032]: I1213 02:10:53.774316 2032 kubelet_node_status.go:75] "Successfully registered node" node="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:10:53.837924 kubelet[2032]: I1213 02:10:53.837866 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/c81d115c0b4384878cd15e52103bc5cb-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal\" (UID: \"c81d115c0b4384878cd15e52103bc5cb\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:10:53.838174 kubelet[2032]: I1213 02:10:53.837932 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/40f011c1fd0f919c60d3d40bc15aaacd-kubeconfig\") pod \"kube-scheduler-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal\" (UID: \"40f011c1fd0f919c60d3d40bc15aaacd\") " pod="kube-system/kube-scheduler-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:10:53.838174 kubelet[2032]: I1213 02:10:53.837969 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/ee4b1c3e322093b6efff03513f32cb44-ca-certs\") pod \"kube-apiserver-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal\" (UID: \"ee4b1c3e322093b6efff03513f32cb44\") " pod="kube-system/kube-apiserver-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:10:53.838174 kubelet[2032]: I1213 02:10:53.837996 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/ee4b1c3e322093b6efff03513f32cb44-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal\" (UID: \"ee4b1c3e322093b6efff03513f32cb44\") " pod="kube-system/kube-apiserver-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:10:53.838174 kubelet[2032]: I1213 02:10:53.838023 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/c81d115c0b4384878cd15e52103bc5cb-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal\" (UID: \"c81d115c0b4384878cd15e52103bc5cb\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:10:53.838404 kubelet[2032]: I1213 02:10:53.838048 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/c81d115c0b4384878cd15e52103bc5cb-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal\" (UID: \"c81d115c0b4384878cd15e52103bc5cb\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:10:53.838404 kubelet[2032]: I1213 02:10:53.838081 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/ee4b1c3e322093b6efff03513f32cb44-k8s-certs\") pod \"kube-apiserver-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal\" (UID: \"ee4b1c3e322093b6efff03513f32cb44\") " pod="kube-system/kube-apiserver-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:10:53.838404 kubelet[2032]: I1213 02:10:53.838136 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/c81d115c0b4384878cd15e52103bc5cb-ca-certs\") pod \"kube-controller-manager-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal\" (UID: \"c81d115c0b4384878cd15e52103bc5cb\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:10:53.838404 kubelet[2032]: I1213 02:10:53.838176 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/c81d115c0b4384878cd15e52103bc5cb-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal\" (UID: \"c81d115c0b4384878cd15e52103bc5cb\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:10:54.520355 kubelet[2032]: I1213 02:10:54.520310 2032 apiserver.go:52] "Watching apiserver" Dec 13 02:10:54.536956 kubelet[2032]: I1213 02:10:54.536917 2032 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Dec 13 02:10:54.628016 kubelet[2032]: W1213 02:10:54.627163 2032 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Dec 13 02:10:54.628953 kubelet[2032]: E1213 02:10:54.628916 2032 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal\" already exists" pod="kube-system/kube-apiserver-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:10:54.658306 kubelet[2032]: I1213 02:10:54.658194 2032 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" podStartSLOduration=1.658150709 podStartE2EDuration="1.658150709s" podCreationTimestamp="2024-12-13 02:10:53 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:10:54.65688549 +0000 UTC m=+1.255355890" watchObservedRunningTime="2024-12-13 02:10:54.658150709 +0000 UTC m=+1.256621117" Dec 13 02:10:54.668811 kubelet[2032]: I1213 02:10:54.668722 2032 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" podStartSLOduration=1.6686995040000001 podStartE2EDuration="1.668699504s" podCreationTimestamp="2024-12-13 02:10:53 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:10:54.668367683 +0000 UTC m=+1.266838092" watchObservedRunningTime="2024-12-13 02:10:54.668699504 +0000 UTC m=+1.267169913" Dec 13 02:10:54.683803 kubelet[2032]: I1213 02:10:54.683633 2032 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" podStartSLOduration=1.683607554 podStartE2EDuration="1.683607554s" podCreationTimestamp="2024-12-13 02:10:53 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:10:54.68353159 +0000 UTC m=+1.282001993" watchObservedRunningTime="2024-12-13 02:10:54.683607554 +0000 UTC m=+1.282077958" Dec 13 02:10:56.773685 update_engine[1212]: I1213 02:10:56.773077 1212 update_attempter.cc:509] Updating boot flags... Dec 13 02:10:57.212637 kernel: kauditd_printk_skb: 272 callbacks suppressed Dec 13 02:10:57.212835 kernel: audit: type=1400 audit(1734055857.201:708): avc: denied { watch } for pid=1905 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:10:57.201000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:10:57.267782 kernel: audit: type=1300 audit(1734055857.201:708): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0009b4700 a2=fc6 a3=0 items=0 ppid=1751 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 key=(null) Dec 13 02:10:57.201000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0009b4700 a2=fc6 a3=0 items=0 ppid=1751 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 key=(null) Dec 13 02:10:57.296920 kernel: audit: type=1327 audit(1734055857.201:708): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:10:57.201000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:10:57.322841 kernel: audit: type=1400 audit(1734055857.201:709): avc: denied { watch } for pid=1905 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:10:57.201000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:10:57.357525 kernel: audit: type=1300 audit(1734055857.201:709): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00090c020 a2=fc6 a3=0 items=0 ppid=1751 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 key=(null) Dec 13 02:10:57.201000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00090c020 a2=fc6 a3=0 items=0 ppid=1751 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 key=(null) Dec 13 02:10:57.201000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:10:57.412575 kernel: audit: type=1327 audit(1734055857.201:709): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:10:57.412752 kernel: audit: type=1400 audit(1734055857.201:710): avc: denied { watch } for pid=1905 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:10:57.201000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:10:57.201000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:10:57.201000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0009b4720 a2=fc6 a3=0 items=0 ppid=1751 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 key=(null) Dec 13 02:10:57.473282 kernel: audit: type=1400 audit(1734055857.201:711): avc: denied { watch } for pid=1905 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:10:57.473482 kernel: audit: type=1300 audit(1734055857.201:711): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0009b4720 a2=fc6 a3=0 items=0 ppid=1751 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 key=(null) Dec 13 02:10:57.473537 kernel: audit: type=1327 audit(1734055857.201:711): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:10:57.201000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:10:57.201000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00090c040 a2=fc6 a3=0 items=0 ppid=1751 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 key=(null) Dec 13 02:10:57.201000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:10:57.412000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 02:10:57.412000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b5db00 a2=fc6 a3=0 items=0 ppid=1751 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 key=(null) Dec 13 02:10:57.412000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:10:59.986036 sudo[1439]: pam_unix(sudo:session): session closed for user root Dec 13 02:10:59.984000 audit[1439]: USER_END pid=1439 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:10:59.984000 audit[1439]: CRED_DISP pid=1439 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:11:00.029199 sshd[1436]: pam_unix(sshd:session): session closed for user core Dec 13 02:11:00.030000 audit[1436]: USER_END pid=1436 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:11:00.030000 audit[1436]: CRED_DISP pid=1436 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:11:00.034079 systemd[1]: sshd@7-10.128.0.74:22-139.178.68.195:58284.service: Deactivated successfully. Dec 13 02:11:00.032000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.74:22-139.178.68.195:58284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:11:00.035205 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 02:11:00.035427 systemd[1]: session-7.scope: Consumed 6.010s CPU time. Dec 13 02:11:00.036213 systemd-logind[1211]: Session 7 logged out. Waiting for processes to exit. Dec 13 02:11:00.037555 systemd-logind[1211]: Removed session 7. Dec 13 02:11:00.796387 kubelet[2032]: I1213 02:11:00.796320 2032 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 02:11:00.797155 env[1220]: time="2024-12-13T02:11:00.796995134Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 02:11:00.797650 kubelet[2032]: I1213 02:11:00.797393 2032 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 02:11:01.750900 systemd[1]: Created slice kubepods-besteffort-podc6c41a75_bd8b_4541_8962_ae955a21a3b7.slice. Dec 13 02:11:01.896786 kubelet[2032]: I1213 02:11:01.896735 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/5c23b9c4-3a81-49c9-893a-8764f88f3d2c-var-lib-calico\") pod \"tigera-operator-76c4976dd7-8ln57\" (UID: \"5c23b9c4-3a81-49c9-893a-8764f88f3d2c\") " pod="tigera-operator/tigera-operator-76c4976dd7-8ln57" Dec 13 02:11:01.897320 kubelet[2032]: I1213 02:11:01.896795 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/c6c41a75-bd8b-4541-8962-ae955a21a3b7-lib-modules\") pod \"kube-proxy-4qj7d\" (UID: \"c6c41a75-bd8b-4541-8962-ae955a21a3b7\") " pod="kube-system/kube-proxy-4qj7d" Dec 13 02:11:01.897320 kubelet[2032]: I1213 02:11:01.896825 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/c6c41a75-bd8b-4541-8962-ae955a21a3b7-xtables-lock\") pod \"kube-proxy-4qj7d\" (UID: \"c6c41a75-bd8b-4541-8962-ae955a21a3b7\") " pod="kube-system/kube-proxy-4qj7d" Dec 13 02:11:01.897320 kubelet[2032]: I1213 02:11:01.896850 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-66hnt\" (UniqueName: \"kubernetes.io/projected/5c23b9c4-3a81-49c9-893a-8764f88f3d2c-kube-api-access-66hnt\") pod \"tigera-operator-76c4976dd7-8ln57\" (UID: \"5c23b9c4-3a81-49c9-893a-8764f88f3d2c\") " pod="tigera-operator/tigera-operator-76c4976dd7-8ln57" Dec 13 02:11:01.897320 kubelet[2032]: I1213 02:11:01.896880 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/c6c41a75-bd8b-4541-8962-ae955a21a3b7-kube-proxy\") pod \"kube-proxy-4qj7d\" (UID: \"c6c41a75-bd8b-4541-8962-ae955a21a3b7\") " pod="kube-system/kube-proxy-4qj7d" Dec 13 02:11:01.897320 kubelet[2032]: I1213 02:11:01.896912 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bppsg\" (UniqueName: \"kubernetes.io/projected/c6c41a75-bd8b-4541-8962-ae955a21a3b7-kube-api-access-bppsg\") pod \"kube-proxy-4qj7d\" (UID: \"c6c41a75-bd8b-4541-8962-ae955a21a3b7\") " pod="kube-system/kube-proxy-4qj7d" Dec 13 02:11:01.902490 systemd[1]: Created slice kubepods-besteffort-pod5c23b9c4_3a81_49c9_893a_8764f88f3d2c.slice. Dec 13 02:11:01.910268 kubelet[2032]: W1213 02:11:01.910217 2032 reflector.go:561] object-"tigera-operator"/"kubernetes-services-endpoint": failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal' and this object Dec 13 02:11:01.910444 kubelet[2032]: E1213 02:11:01.910279 2032 reflector.go:158] "Unhandled Error" err="object-\"tigera-operator\"/\"kubernetes-services-endpoint\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"kubernetes-services-endpoint\" is forbidden: User \"system:node:ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"tigera-operator\": no relationship found between node 'ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal' and this object" logger="UnhandledError" Dec 13 02:11:01.910674 kubelet[2032]: W1213 02:11:01.910541 2032 reflector.go:561] object-"tigera-operator"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal' and this object Dec 13 02:11:01.910674 kubelet[2032]: E1213 02:11:01.910593 2032 reflector.go:158] "Unhandled Error" err="object-\"tigera-operator\"/\"kube-root-ca.crt\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"kube-root-ca.crt\" is forbidden: User \"system:node:ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"tigera-operator\": no relationship found between node 'ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal' and this object" logger="UnhandledError" Dec 13 02:11:02.007715 kubelet[2032]: I1213 02:11:02.007555 2032 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Dec 13 02:11:02.061338 env[1220]: time="2024-12-13T02:11:02.061276608Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-4qj7d,Uid:c6c41a75-bd8b-4541-8962-ae955a21a3b7,Namespace:kube-system,Attempt:0,}" Dec 13 02:11:02.087944 env[1220]: time="2024-12-13T02:11:02.087834548Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:11:02.087944 env[1220]: time="2024-12-13T02:11:02.087890896Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:11:02.088313 env[1220]: time="2024-12-13T02:11:02.088240042Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:11:02.089616 env[1220]: time="2024-12-13T02:11:02.089537434Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/90fdac52f906e6fc7a0ed9f0595be29927880fc3253947e3c05138a87848a882 pid=2127 runtime=io.containerd.runc.v2 Dec 13 02:11:02.124171 systemd[1]: Started cri-containerd-90fdac52f906e6fc7a0ed9f0595be29927880fc3253947e3c05138a87848a882.scope. Dec 13 02:11:02.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.142000 audit: BPF prog-id=112 op=LOAD Dec 13 02:11:02.143000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.143000 audit[2136]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2127 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930666461633532663930366536666337613065643966303539356265 Dec 13 02:11:02.143000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.143000 audit[2136]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2127 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930666461633532663930366536666337613065643966303539356265 Dec 13 02:11:02.143000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.143000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.143000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.143000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.143000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.143000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.143000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.143000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.143000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.143000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.143000 audit: BPF prog-id=113 op=LOAD Dec 13 02:11:02.143000 audit[2136]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00028ac50 items=0 ppid=2127 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930666461633532663930366536666337613065643966303539356265 Dec 13 02:11:02.143000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.143000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.143000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.143000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.143000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.143000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.143000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.143000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.143000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.143000 audit: BPF prog-id=114 op=LOAD Dec 13 02:11:02.143000 audit[2136]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00028ac98 items=0 ppid=2127 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930666461633532663930366536666337613065643966303539356265 Dec 13 02:11:02.144000 audit: BPF prog-id=114 op=UNLOAD Dec 13 02:11:02.144000 audit: BPF prog-id=113 op=UNLOAD Dec 13 02:11:02.144000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.144000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.144000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.144000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.144000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.144000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.144000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.144000 audit[2136]: AVC avc: denied { perfmon } for pid=2136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.144000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.144000 audit[2136]: AVC avc: denied { bpf } for pid=2136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.144000 audit: BPF prog-id=115 op=LOAD Dec 13 02:11:02.144000 audit[2136]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00028b0a8 items=0 ppid=2127 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930666461633532663930366536666337613065643966303539356265 Dec 13 02:11:02.167467 env[1220]: time="2024-12-13T02:11:02.167380187Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-4qj7d,Uid:c6c41a75-bd8b-4541-8962-ae955a21a3b7,Namespace:kube-system,Attempt:0,} returns sandbox id \"90fdac52f906e6fc7a0ed9f0595be29927880fc3253947e3c05138a87848a882\"" Dec 13 02:11:02.172737 env[1220]: time="2024-12-13T02:11:02.172554691Z" level=info msg="CreateContainer within sandbox \"90fdac52f906e6fc7a0ed9f0595be29927880fc3253947e3c05138a87848a882\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 02:11:02.209061 env[1220]: time="2024-12-13T02:11:02.208973018Z" level=info msg="CreateContainer within sandbox \"90fdac52f906e6fc7a0ed9f0595be29927880fc3253947e3c05138a87848a882\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"598373df570cca8d03e2a1559223e0a741b6de2713d54926c172634c95b85167\"" Dec 13 02:11:02.211272 env[1220]: time="2024-12-13T02:11:02.210056657Z" level=info msg="StartContainer for \"598373df570cca8d03e2a1559223e0a741b6de2713d54926c172634c95b85167\"" Dec 13 02:11:02.236486 systemd[1]: Started cri-containerd-598373df570cca8d03e2a1559223e0a741b6de2713d54926c172634c95b85167.scope. Dec 13 02:11:02.260000 audit[2168]: AVC avc: denied { perfmon } for pid=2168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.288329 kernel: kauditd_printk_skb: 67 callbacks suppressed Dec 13 02:11:02.288494 kernel: audit: type=1400 audit(1734055862.260:736): avc: denied { perfmon } for pid=2168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.260000 audit[2168]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f7db77e1228 items=0 ppid=2127 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.322662 kernel: audit: type=1300 audit(1734055862.260:736): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f7db77e1228 items=0 ppid=2127 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539383337336466353730636361386430336532613135353932323365 Dec 13 02:11:02.351599 kernel: audit: type=1327 audit(1734055862.260:736): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539383337336466353730636361386430336532613135353932323365 Dec 13 02:11:02.260000 audit[2168]: AVC avc: denied { bpf } for pid=2168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.399385 kernel: audit: type=1400 audit(1734055862.260:737): avc: denied { bpf } for pid=2168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.399555 kernel: audit: type=1400 audit(1734055862.260:737): avc: denied { bpf } for pid=2168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.399617 kernel: audit: type=1400 audit(1734055862.260:737): avc: denied { bpf } for pid=2168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.260000 audit[2168]: AVC avc: denied { bpf } for pid=2168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.260000 audit[2168]: AVC avc: denied { bpf } for pid=2168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.260000 audit[2168]: AVC avc: denied { perfmon } for pid=2168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.421331 env[1220]: time="2024-12-13T02:11:02.421277778Z" level=info msg="StartContainer for \"598373df570cca8d03e2a1559223e0a741b6de2713d54926c172634c95b85167\" returns successfully" Dec 13 02:11:02.260000 audit[2168]: AVC avc: denied { perfmon } for pid=2168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.441768 kernel: audit: type=1400 audit(1734055862.260:737): avc: denied { perfmon } for pid=2168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.441841 kernel: audit: type=1400 audit(1734055862.260:737): avc: denied { perfmon } for pid=2168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.260000 audit[2168]: AVC avc: denied { perfmon } for pid=2168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.483819 kernel: audit: type=1400 audit(1734055862.260:737): avc: denied { perfmon } for pid=2168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.506593 kernel: audit: type=1400 audit(1734055862.260:737): avc: denied { perfmon } for pid=2168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.260000 audit[2168]: AVC avc: denied { perfmon } for pid=2168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.260000 audit[2168]: AVC avc: denied { perfmon } for pid=2168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.260000 audit[2168]: AVC avc: denied { bpf } for pid=2168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.260000 audit[2168]: AVC avc: denied { bpf } for pid=2168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.260000 audit: BPF prog-id=116 op=LOAD Dec 13 02:11:02.260000 audit[2168]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002c5c88 items=0 ppid=2127 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539383337336466353730636361386430336532613135353932323365 Dec 13 02:11:02.326000 audit[2168]: AVC avc: denied { bpf } for pid=2168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.326000 audit[2168]: AVC avc: denied { bpf } for pid=2168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.326000 audit[2168]: AVC avc: denied { perfmon } for pid=2168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.326000 audit[2168]: AVC avc: denied { perfmon } for pid=2168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.326000 audit[2168]: AVC avc: denied { perfmon } for pid=2168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.326000 audit[2168]: AVC avc: denied { perfmon } for pid=2168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.326000 audit[2168]: AVC avc: denied { perfmon } for pid=2168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.326000 audit[2168]: AVC avc: denied { bpf } for pid=2168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.326000 audit[2168]: AVC avc: denied { bpf } for pid=2168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.326000 audit: BPF prog-id=117 op=LOAD Dec 13 02:11:02.326000 audit[2168]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000a9138 items=0 ppid=2127 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.326000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539383337336466353730636361386430336532613135353932323365 Dec 13 02:11:02.350000 audit: BPF prog-id=117 op=UNLOAD Dec 13 02:11:02.350000 audit: BPF prog-id=116 op=UNLOAD Dec 13 02:11:02.350000 audit[2168]: AVC avc: denied { bpf } for pid=2168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.350000 audit[2168]: AVC avc: denied { bpf } for pid=2168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.350000 audit[2168]: AVC avc: denied { bpf } for pid=2168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.350000 audit[2168]: AVC avc: denied { perfmon } for pid=2168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.350000 audit[2168]: AVC avc: denied { perfmon } for pid=2168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.350000 audit[2168]: AVC avc: denied { perfmon } for pid=2168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.350000 audit[2168]: AVC avc: denied { perfmon } for pid=2168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.350000 audit[2168]: AVC avc: denied { perfmon } for pid=2168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.350000 audit[2168]: AVC avc: denied { bpf } for pid=2168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.350000 audit[2168]: AVC avc: denied { bpf } for pid=2168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:02.350000 audit: BPF prog-id=118 op=LOAD Dec 13 02:11:02.350000 audit[2168]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000a91c8 items=0 ppid=2127 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539383337336466353730636361386430336532613135353932323365 Dec 13 02:11:02.623000 audit[2229]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2229 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:11:02.623000 audit[2229]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd59685d50 a2=0 a3=7ffd59685d3c items=0 ppid=2179 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.623000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 02:11:02.624000 audit[2230]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2230 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:11:02.624000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffda1c7cf90 a2=0 a3=7ffda1c7cf7c items=0 ppid=2179 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.624000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 02:11:02.626000 audit[2231]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2231 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:11:02.626000 audit[2231]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe88e0caf0 a2=0 a3=7ffe88e0cadc items=0 ppid=2179 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.626000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 02:11:02.628000 audit[2232]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2232 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:11:02.628000 audit[2232]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd628d62d0 a2=0 a3=7ffd628d62bc items=0 ppid=2179 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.628000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 02:11:02.630000 audit[2234]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2234 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:11:02.630000 audit[2234]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeae52e700 a2=0 a3=7ffeae52e6ec items=0 ppid=2179 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.630000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 02:11:02.644000 audit[2233]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2233 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:11:02.644000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeba4cda50 a2=0 a3=7ffeba4cda3c items=0 ppid=2179 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.644000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 02:11:02.661124 kubelet[2032]: I1213 02:11:02.661034 2032 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-4qj7d" podStartSLOduration=1.661008454 podStartE2EDuration="1.661008454s" podCreationTimestamp="2024-12-13 02:11:01 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:11:02.645117659 +0000 UTC m=+9.243588068" watchObservedRunningTime="2024-12-13 02:11:02.661008454 +0000 UTC m=+9.259478864" Dec 13 02:11:02.735000 audit[2235]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2235 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:11:02.735000 audit[2235]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe5db1d1f0 a2=0 a3=7ffe5db1d1dc items=0 ppid=2179 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.735000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 02:11:02.740000 audit[2237]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2237 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:11:02.740000 audit[2237]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe873c29f0 a2=0 a3=7ffe873c29dc items=0 ppid=2179 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.740000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 02:11:02.746000 audit[2240]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2240 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:11:02.746000 audit[2240]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd05adee70 a2=0 a3=7ffd05adee5c items=0 ppid=2179 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.746000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 02:11:02.747000 audit[2241]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2241 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:11:02.747000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe09b3bbb0 a2=0 a3=7ffe09b3bb9c items=0 ppid=2179 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.747000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 02:11:02.752000 audit[2243]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2243 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:11:02.752000 audit[2243]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffd9f4d4f0 a2=0 a3=7fffd9f4d4dc items=0 ppid=2179 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.752000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 02:11:02.753000 audit[2244]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2244 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:11:02.753000 audit[2244]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd8bcc3c70 a2=0 a3=7ffd8bcc3c5c items=0 ppid=2179 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.753000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 02:11:02.758000 audit[2246]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2246 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:11:02.758000 audit[2246]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd7420cde0 a2=0 a3=7ffd7420cdcc items=0 ppid=2179 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.758000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 02:11:02.763000 audit[2249]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2249 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:11:02.763000 audit[2249]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffca2b12bb0 a2=0 a3=7ffca2b12b9c items=0 ppid=2179 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.763000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 02:11:02.765000 audit[2250]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2250 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:11:02.765000 audit[2250]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc6456080 a2=0 a3=7fffc645606c items=0 ppid=2179 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.765000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 02:11:02.769000 audit[2252]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2252 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:11:02.769000 audit[2252]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd3cdbb330 a2=0 a3=7ffd3cdbb31c items=0 ppid=2179 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.769000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 02:11:02.770000 audit[2253]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2253 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:11:02.770000 audit[2253]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff7b5f4b80 a2=0 a3=7fff7b5f4b6c items=0 ppid=2179 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.770000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 02:11:02.774000 audit[2255]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2255 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:11:02.774000 audit[2255]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffcf289a40 a2=0 a3=7fffcf289a2c items=0 ppid=2179 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.774000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:11:02.779000 audit[2258]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2258 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:11:02.779000 audit[2258]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd22785f40 a2=0 a3=7ffd22785f2c items=0 ppid=2179 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.779000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:11:02.786000 audit[2261]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2261 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:11:02.786000 audit[2261]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd7fca82c0 a2=0 a3=7ffd7fca82ac items=0 ppid=2179 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.786000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 02:11:02.788000 audit[2262]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2262 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:11:02.788000 audit[2262]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcd69ca520 a2=0 a3=7ffcd69ca50c items=0 ppid=2179 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.788000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 02:11:02.792000 audit[2264]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2264 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:11:02.792000 audit[2264]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffc0d630cd0 a2=0 a3=7ffc0d630cbc items=0 ppid=2179 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.792000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:11:02.797000 audit[2267]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2267 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:11:02.797000 audit[2267]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdb8f0d160 a2=0 a3=7ffdb8f0d14c items=0 ppid=2179 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.797000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:11:02.799000 audit[2268]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2268 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:11:02.799000 audit[2268]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffffafae600 a2=0 a3=7ffffafae5ec items=0 ppid=2179 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.799000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 02:11:02.802000 audit[2270]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2270 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:11:02.802000 audit[2270]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fff5c5fbc70 a2=0 a3=7fff5c5fbc5c items=0 ppid=2179 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.802000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 02:11:02.839000 audit[2276]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2276 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:11:02.839000 audit[2276]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffc38f4b6f0 a2=0 a3=7ffc38f4b6dc items=0 ppid=2179 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.839000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:11:02.850000 audit[2276]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2276 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:11:02.850000 audit[2276]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffc38f4b6f0 a2=0 a3=7ffc38f4b6dc items=0 ppid=2179 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.850000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:11:02.853000 audit[2281]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2281 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:11:02.853000 audit[2281]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffb09226f0 a2=0 a3=7fffb09226dc items=0 ppid=2179 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.853000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 02:11:02.857000 audit[2283]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2283 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:11:02.857000 audit[2283]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffddff51610 a2=0 a3=7ffddff515fc items=0 ppid=2179 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.857000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 02:11:02.863000 audit[2286]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2286 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:11:02.863000 audit[2286]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffcfb18ac0 a2=0 a3=7fffcfb18aac items=0 ppid=2179 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.863000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 02:11:02.865000 audit[2287]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2287 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:11:02.865000 audit[2287]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeeb898080 a2=0 a3=7ffeeb89806c items=0 ppid=2179 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.865000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 02:11:02.868000 audit[2289]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2289 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:11:02.868000 audit[2289]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffd26e8860 a2=0 a3=7fffd26e884c items=0 ppid=2179 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.868000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 02:11:02.871000 audit[2290]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2290 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:11:02.871000 audit[2290]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffcf69f430 a2=0 a3=7fffcf69f41c items=0 ppid=2179 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.871000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 02:11:02.875000 audit[2292]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2292 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:11:02.875000 audit[2292]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffafe08ff0 a2=0 a3=7fffafe08fdc items=0 ppid=2179 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.875000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 02:11:02.880000 audit[2295]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2295 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:11:02.880000 audit[2295]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffeef287450 a2=0 a3=7ffeef28743c items=0 ppid=2179 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.880000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 02:11:02.883000 audit[2296]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2296 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:11:02.883000 audit[2296]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc6b927070 a2=0 a3=7ffc6b92705c items=0 ppid=2179 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.883000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 02:11:02.890000 audit[2298]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2298 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:11:02.890000 audit[2298]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd9c4d7790 a2=0 a3=7ffd9c4d777c items=0 ppid=2179 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.890000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 02:11:02.892000 audit[2299]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2299 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:11:02.892000 audit[2299]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd0b4aeb70 a2=0 a3=7ffd0b4aeb5c items=0 ppid=2179 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.892000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 02:11:02.897000 audit[2301]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2301 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:11:02.897000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd3ecde460 a2=0 a3=7ffd3ecde44c items=0 ppid=2179 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.897000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:11:02.902000 audit[2304]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2304 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:11:02.902000 audit[2304]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd55f38540 a2=0 a3=7ffd55f3852c items=0 ppid=2179 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.902000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 02:11:02.907000 audit[2307]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2307 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:11:02.907000 audit[2307]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdda0f2c10 a2=0 a3=7ffdda0f2bfc items=0 ppid=2179 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.907000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 02:11:02.909000 audit[2308]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:11:02.909000 audit[2308]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffeeec83f00 a2=0 a3=7ffeeec83eec items=0 ppid=2179 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.909000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 02:11:02.912000 audit[2310]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2310 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:11:02.912000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc80f52240 a2=0 a3=7ffc80f5222c items=0 ppid=2179 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.912000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:11:02.918000 audit[2313]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2313 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:11:02.918000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffdad93c6d0 a2=0 a3=7ffdad93c6bc items=0 ppid=2179 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.918000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:11:02.921000 audit[2314]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2314 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:11:02.921000 audit[2314]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff83cd1ba0 a2=0 a3=7fff83cd1b8c items=0 ppid=2179 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.921000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 02:11:02.927000 audit[2316]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2316 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:11:02.927000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffccf141df0 a2=0 a3=7ffccf141ddc items=0 ppid=2179 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.927000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 02:11:02.930000 audit[2317]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2317 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:11:02.930000 audit[2317]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdadee3f90 a2=0 a3=7ffdadee3f7c items=0 ppid=2179 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.930000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 02:11:02.935000 audit[2319]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2319 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:11:02.935000 audit[2319]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdf1347410 a2=0 a3=7ffdf13473fc items=0 ppid=2179 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.935000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:11:02.940000 audit[2322]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2322 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:11:02.940000 audit[2322]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffec234ea20 a2=0 a3=7ffec234ea0c items=0 ppid=2179 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.940000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:11:02.946000 audit[2324]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2324 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 02:11:02.946000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7fff80cbd2d0 a2=0 a3=7fff80cbd2bc items=0 ppid=2179 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.946000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:11:02.947000 audit[2324]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2324 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 02:11:02.947000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fff80cbd2d0 a2=0 a3=7fff80cbd2bc items=0 ppid=2179 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:02.947000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:11:03.007815 kubelet[2032]: E1213 02:11:03.007755 2032 projected.go:288] Couldn't get configMap tigera-operator/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Dec 13 02:11:03.007815 kubelet[2032]: E1213 02:11:03.007810 2032 projected.go:194] Error preparing data for projected volume kube-api-access-66hnt for pod tigera-operator/tigera-operator-76c4976dd7-8ln57: failed to sync configmap cache: timed out waiting for the condition Dec 13 02:11:03.008471 kubelet[2032]: E1213 02:11:03.007940 2032 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/5c23b9c4-3a81-49c9-893a-8764f88f3d2c-kube-api-access-66hnt podName:5c23b9c4-3a81-49c9-893a-8764f88f3d2c nodeName:}" failed. No retries permitted until 2024-12-13 02:11:03.507889676 +0000 UTC m=+10.106360079 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-66hnt" (UniqueName: "kubernetes.io/projected/5c23b9c4-3a81-49c9-893a-8764f88f3d2c-kube-api-access-66hnt") pod "tigera-operator-76c4976dd7-8ln57" (UID: "5c23b9c4-3a81-49c9-893a-8764f88f3d2c") : failed to sync configmap cache: timed out waiting for the condition Dec 13 02:11:03.708696 env[1220]: time="2024-12-13T02:11:03.708622914Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4976dd7-8ln57,Uid:5c23b9c4-3a81-49c9-893a-8764f88f3d2c,Namespace:tigera-operator,Attempt:0,}" Dec 13 02:11:03.740410 env[1220]: time="2024-12-13T02:11:03.740312563Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:11:03.740642 env[1220]: time="2024-12-13T02:11:03.740368235Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:11:03.740642 env[1220]: time="2024-12-13T02:11:03.740387311Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:11:03.740642 env[1220]: time="2024-12-13T02:11:03.740595760Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/080975c64a5fc1814fdce4b05f1ef3d93d6aaab55b6db3db0cd1de46285736b7 pid=2335 runtime=io.containerd.runc.v2 Dec 13 02:11:03.770941 systemd[1]: Started cri-containerd-080975c64a5fc1814fdce4b05f1ef3d93d6aaab55b6db3db0cd1de46285736b7.scope. Dec 13 02:11:03.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:03.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:03.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:03.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:03.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:03.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:03.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:03.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:03.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:03.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:03.789000 audit: BPF prog-id=119 op=LOAD Dec 13 02:11:03.790000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:03.790000 audit[2345]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2335 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:03.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038303937356336346135666331383134666463653462303566316566 Dec 13 02:11:03.790000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:03.790000 audit[2345]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2335 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:03.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038303937356336346135666331383134666463653462303566316566 Dec 13 02:11:03.790000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:03.790000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:03.790000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:03.790000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:03.790000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:03.790000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:03.790000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:03.790000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:03.790000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:03.790000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:03.790000 audit: BPF prog-id=120 op=LOAD Dec 13 02:11:03.790000 audit[2345]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003083a0 items=0 ppid=2335 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:03.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038303937356336346135666331383134666463653462303566316566 Dec 13 02:11:03.790000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:03.790000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:03.790000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:03.790000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:03.790000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:03.790000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:03.790000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:03.790000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:03.790000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:03.790000 audit: BPF prog-id=121 op=LOAD Dec 13 02:11:03.790000 audit[2345]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003083e8 items=0 ppid=2335 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:03.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038303937356336346135666331383134666463653462303566316566 Dec 13 02:11:03.790000 audit: BPF prog-id=121 op=UNLOAD Dec 13 02:11:03.790000 audit: BPF prog-id=120 op=UNLOAD Dec 13 02:11:03.790000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:03.790000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:03.790000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:03.790000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:03.790000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:03.790000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:03.790000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:03.790000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:03.790000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:03.790000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:03.790000 audit: BPF prog-id=122 op=LOAD Dec 13 02:11:03.790000 audit[2345]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003087f8 items=0 ppid=2335 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:03.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038303937356336346135666331383134666463653462303566316566 Dec 13 02:11:03.834931 env[1220]: time="2024-12-13T02:11:03.834871336Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4976dd7-8ln57,Uid:5c23b9c4-3a81-49c9-893a-8764f88f3d2c,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"080975c64a5fc1814fdce4b05f1ef3d93d6aaab55b6db3db0cd1de46285736b7\"" Dec 13 02:11:03.838709 env[1220]: time="2024-12-13T02:11:03.837509509Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 02:11:07.783669 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount412898406.mount: Deactivated successfully. Dec 13 02:11:08.640134 env[1220]: time="2024-12-13T02:11:08.640036415Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:11:08.643294 env[1220]: time="2024-12-13T02:11:08.643234862Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:11:08.646116 env[1220]: time="2024-12-13T02:11:08.646052191Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:11:08.648705 env[1220]: time="2024-12-13T02:11:08.648640682Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:11:08.649775 env[1220]: time="2024-12-13T02:11:08.649733990Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Dec 13 02:11:08.654059 env[1220]: time="2024-12-13T02:11:08.653957138Z" level=info msg="CreateContainer within sandbox \"080975c64a5fc1814fdce4b05f1ef3d93d6aaab55b6db3db0cd1de46285736b7\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 02:11:08.676545 env[1220]: time="2024-12-13T02:11:08.676427557Z" level=info msg="CreateContainer within sandbox \"080975c64a5fc1814fdce4b05f1ef3d93d6aaab55b6db3db0cd1de46285736b7\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"1a3babe2fac443639fb3603a5ff2405a0fed8fe8522f7dfdb5db3fa4aa7291f8\"" Dec 13 02:11:08.677545 env[1220]: time="2024-12-13T02:11:08.677504069Z" level=info msg="StartContainer for \"1a3babe2fac443639fb3603a5ff2405a0fed8fe8522f7dfdb5db3fa4aa7291f8\"" Dec 13 02:11:08.705161 systemd[1]: Started cri-containerd-1a3babe2fac443639fb3603a5ff2405a0fed8fe8522f7dfdb5db3fa4aa7291f8.scope. Dec 13 02:11:08.758232 kernel: kauditd_printk_skb: 243 callbacks suppressed Dec 13 02:11:08.758406 kernel: audit: type=1400 audit(1734055868.730:811): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.782682 kernel: audit: type=1400 audit(1734055868.730:812): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.825183 kernel: audit: type=1400 audit(1734055868.730:813): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.825874 kernel: audit: type=1400 audit(1734055868.730:814): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.825960 kernel: audit: type=1400 audit(1734055868.730:815): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.867067 kernel: audit: type=1400 audit(1734055868.730:816): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.867555 kernel: audit: type=1400 audit(1734055868.730:817): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.909716 kernel: audit: type=1400 audit(1734055868.730:818): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.954878 kernel: audit: type=1400 audit(1734055868.730:819): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.955320 kernel: audit: type=1400 audit(1734055868.756:820): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.756000 audit: BPF prog-id=123 op=LOAD Dec 13 02:11:08.758000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.758000 audit[2375]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2335 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:08.956435 env[1220]: time="2024-12-13T02:11:08.956378662Z" level=info msg="StartContainer for \"1a3babe2fac443639fb3603a5ff2405a0fed8fe8522f7dfdb5db3fa4aa7291f8\" returns successfully" Dec 13 02:11:08.758000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161336261626532666163343433363339666233363033613566663234 Dec 13 02:11:08.758000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.758000 audit[2375]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2335 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:08.758000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161336261626532666163343433363339666233363033613566663234 Dec 13 02:11:08.758000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.758000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.758000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.758000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.758000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.758000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.758000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.758000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.758000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.758000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.758000 audit: BPF prog-id=124 op=LOAD Dec 13 02:11:08.758000 audit[2375]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001db2d0 items=0 ppid=2335 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:08.758000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161336261626532666163343433363339666233363033613566663234 Dec 13 02:11:08.780000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.780000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.780000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.780000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.780000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.780000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.780000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.780000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.780000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.780000 audit: BPF prog-id=125 op=LOAD Dec 13 02:11:08.780000 audit[2375]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001db318 items=0 ppid=2335 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:08.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161336261626532666163343433363339666233363033613566663234 Dec 13 02:11:08.780000 audit: BPF prog-id=125 op=UNLOAD Dec 13 02:11:08.781000 audit: BPF prog-id=124 op=UNLOAD Dec 13 02:11:08.781000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.781000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.781000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.781000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.781000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.781000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.781000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.781000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.781000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.781000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:08.781000 audit: BPF prog-id=126 op=LOAD Dec 13 02:11:08.781000 audit[2375]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001db728 items=0 ppid=2335 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:08.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161336261626532666163343433363339666233363033613566663234 Dec 13 02:11:12.180000 audit[2411]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2411 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:11:12.180000 audit[2411]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc581b1ce0 a2=0 a3=7ffc581b1ccc items=0 ppid=2179 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:12.180000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:11:12.183000 audit[2411]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2411 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:11:12.183000 audit[2411]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc581b1ce0 a2=0 a3=0 items=0 ppid=2179 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:12.183000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:11:12.205000 audit[2413]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2413 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:11:12.205000 audit[2413]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc38e8a770 a2=0 a3=7ffc38e8a75c items=0 ppid=2179 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:12.205000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:11:12.211000 audit[2413]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2413 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:11:12.211000 audit[2413]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc38e8a770 a2=0 a3=0 items=0 ppid=2179 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:12.211000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:11:12.394246 kubelet[2032]: I1213 02:11:12.394142 2032 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-76c4976dd7-8ln57" podStartSLOduration=6.578701244 podStartE2EDuration="11.394116265s" podCreationTimestamp="2024-12-13 02:11:01 +0000 UTC" firstStartedPulling="2024-12-13 02:11:03.83643887 +0000 UTC m=+10.434909266" lastFinishedPulling="2024-12-13 02:11:08.651853906 +0000 UTC m=+15.250324287" observedRunningTime="2024-12-13 02:11:09.652893139 +0000 UTC m=+16.251363547" watchObservedRunningTime="2024-12-13 02:11:12.394116265 +0000 UTC m=+18.992586685" Dec 13 02:11:12.403332 systemd[1]: Created slice kubepods-besteffort-pod4b6c34b4_cbf1_4a62_9b60_e4dbe333d317.slice. Dec 13 02:11:12.437985 kubelet[2032]: I1213 02:11:12.437799 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4b6c34b4-cbf1-4a62-9b60-e4dbe333d317-tigera-ca-bundle\") pod \"calico-typha-bfc654496-54qwq\" (UID: \"4b6c34b4-cbf1-4a62-9b60-e4dbe333d317\") " pod="calico-system/calico-typha-bfc654496-54qwq" Dec 13 02:11:12.437985 kubelet[2032]: I1213 02:11:12.437915 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/4b6c34b4-cbf1-4a62-9b60-e4dbe333d317-typha-certs\") pod \"calico-typha-bfc654496-54qwq\" (UID: \"4b6c34b4-cbf1-4a62-9b60-e4dbe333d317\") " pod="calico-system/calico-typha-bfc654496-54qwq" Dec 13 02:11:12.438262 kubelet[2032]: I1213 02:11:12.437992 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h6t6z\" (UniqueName: \"kubernetes.io/projected/4b6c34b4-cbf1-4a62-9b60-e4dbe333d317-kube-api-access-h6t6z\") pod \"calico-typha-bfc654496-54qwq\" (UID: \"4b6c34b4-cbf1-4a62-9b60-e4dbe333d317\") " pod="calico-system/calico-typha-bfc654496-54qwq" Dec 13 02:11:12.647999 systemd[1]: Created slice kubepods-besteffort-pod12da52d6_ae60_4220_8891_d93eb2e8d034.slice. Dec 13 02:11:12.710283 env[1220]: time="2024-12-13T02:11:12.709739224Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-bfc654496-54qwq,Uid:4b6c34b4-cbf1-4a62-9b60-e4dbe333d317,Namespace:calico-system,Attempt:0,}" Dec 13 02:11:12.740971 kubelet[2032]: I1213 02:11:12.739549 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/12da52d6-ae60-4220-8891-d93eb2e8d034-tigera-ca-bundle\") pod \"calico-node-z8vb9\" (UID: \"12da52d6-ae60-4220-8891-d93eb2e8d034\") " pod="calico-system/calico-node-z8vb9" Dec 13 02:11:12.740971 kubelet[2032]: I1213 02:11:12.739667 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/12da52d6-ae60-4220-8891-d93eb2e8d034-var-run-calico\") pod \"calico-node-z8vb9\" (UID: \"12da52d6-ae60-4220-8891-d93eb2e8d034\") " pod="calico-system/calico-node-z8vb9" Dec 13 02:11:12.740971 kubelet[2032]: I1213 02:11:12.739700 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/12da52d6-ae60-4220-8891-d93eb2e8d034-var-lib-calico\") pod \"calico-node-z8vb9\" (UID: \"12da52d6-ae60-4220-8891-d93eb2e8d034\") " pod="calico-system/calico-node-z8vb9" Dec 13 02:11:12.740971 kubelet[2032]: I1213 02:11:12.739729 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/12da52d6-ae60-4220-8891-d93eb2e8d034-flexvol-driver-host\") pod \"calico-node-z8vb9\" (UID: \"12da52d6-ae60-4220-8891-d93eb2e8d034\") " pod="calico-system/calico-node-z8vb9" Dec 13 02:11:12.740971 kubelet[2032]: I1213 02:11:12.739762 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/12da52d6-ae60-4220-8891-d93eb2e8d034-xtables-lock\") pod \"calico-node-z8vb9\" (UID: \"12da52d6-ae60-4220-8891-d93eb2e8d034\") " pod="calico-system/calico-node-z8vb9" Dec 13 02:11:12.741425 kubelet[2032]: I1213 02:11:12.739804 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/12da52d6-ae60-4220-8891-d93eb2e8d034-cni-bin-dir\") pod \"calico-node-z8vb9\" (UID: \"12da52d6-ae60-4220-8891-d93eb2e8d034\") " pod="calico-system/calico-node-z8vb9" Dec 13 02:11:12.741425 kubelet[2032]: I1213 02:11:12.739837 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/12da52d6-ae60-4220-8891-d93eb2e8d034-cni-net-dir\") pod \"calico-node-z8vb9\" (UID: \"12da52d6-ae60-4220-8891-d93eb2e8d034\") " pod="calico-system/calico-node-z8vb9" Dec 13 02:11:12.741425 kubelet[2032]: I1213 02:11:12.739876 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/12da52d6-ae60-4220-8891-d93eb2e8d034-cni-log-dir\") pod \"calico-node-z8vb9\" (UID: \"12da52d6-ae60-4220-8891-d93eb2e8d034\") " pod="calico-system/calico-node-z8vb9" Dec 13 02:11:12.741425 kubelet[2032]: I1213 02:11:12.739921 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hmf5n\" (UniqueName: \"kubernetes.io/projected/12da52d6-ae60-4220-8891-d93eb2e8d034-kube-api-access-hmf5n\") pod \"calico-node-z8vb9\" (UID: \"12da52d6-ae60-4220-8891-d93eb2e8d034\") " pod="calico-system/calico-node-z8vb9" Dec 13 02:11:12.741425 kubelet[2032]: I1213 02:11:12.739965 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/12da52d6-ae60-4220-8891-d93eb2e8d034-policysync\") pod \"calico-node-z8vb9\" (UID: \"12da52d6-ae60-4220-8891-d93eb2e8d034\") " pod="calico-system/calico-node-z8vb9" Dec 13 02:11:12.741778 kubelet[2032]: I1213 02:11:12.739999 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/12da52d6-ae60-4220-8891-d93eb2e8d034-node-certs\") pod \"calico-node-z8vb9\" (UID: \"12da52d6-ae60-4220-8891-d93eb2e8d034\") " pod="calico-system/calico-node-z8vb9" Dec 13 02:11:12.741778 kubelet[2032]: I1213 02:11:12.740030 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/12da52d6-ae60-4220-8891-d93eb2e8d034-lib-modules\") pod \"calico-node-z8vb9\" (UID: \"12da52d6-ae60-4220-8891-d93eb2e8d034\") " pod="calico-system/calico-node-z8vb9" Dec 13 02:11:12.750286 env[1220]: time="2024-12-13T02:11:12.750195425Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:11:12.750629 env[1220]: time="2024-12-13T02:11:12.750541704Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:11:12.750852 env[1220]: time="2024-12-13T02:11:12.750800949Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:11:12.751264 env[1220]: time="2024-12-13T02:11:12.751210512Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/04eb8a1c240375ceae28c4d7d6ab09a026f57eb626ba647968a8ebdfa892c858 pid=2423 runtime=io.containerd.runc.v2 Dec 13 02:11:12.826001 systemd[1]: Started cri-containerd-04eb8a1c240375ceae28c4d7d6ab09a026f57eb626ba647968a8ebdfa892c858.scope. Dec 13 02:11:12.833256 kubelet[2032]: E1213 02:11:12.832792 2032 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8brk9" podUID="f4842bfe-3151-4850-b245-0e4d809afe99" Dec 13 02:11:12.849437 kubelet[2032]: E1213 02:11:12.849404 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:12.849697 kubelet[2032]: W1213 02:11:12.849669 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:12.849852 kubelet[2032]: E1213 02:11:12.849829 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:12.872858 kubelet[2032]: E1213 02:11:12.872738 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:12.872858 kubelet[2032]: W1213 02:11:12.872765 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:12.872858 kubelet[2032]: E1213 02:11:12.872793 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:12.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:12.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:12.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:12.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:12.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:12.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:12.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:12.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:12.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:12.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:12.890000 audit: BPF prog-id=127 op=LOAD Dec 13 02:11:12.891000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:12.891000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2423 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:12.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034656238613163323430333735636561653238633464376436616230 Dec 13 02:11:12.891000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:12.891000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2423 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:12.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034656238613163323430333735636561653238633464376436616230 Dec 13 02:11:12.892000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:12.892000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:12.892000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:12.892000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:12.892000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:12.892000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:12.892000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:12.892000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:12.892000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:12.892000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:12.892000 audit: BPF prog-id=128 op=LOAD Dec 13 02:11:12.892000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002d9ff0 items=0 ppid=2423 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:12.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034656238613163323430333735636561653238633464376436616230 Dec 13 02:11:12.893000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:12.893000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:12.893000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:12.893000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:12.893000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:12.893000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:12.893000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:12.893000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:12.893000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:12.893000 audit: BPF prog-id=129 op=LOAD Dec 13 02:11:12.893000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003da038 items=0 ppid=2423 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:12.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034656238613163323430333735636561653238633464376436616230 Dec 13 02:11:12.895000 audit: BPF prog-id=129 op=UNLOAD Dec 13 02:11:12.895000 audit: BPF prog-id=128 op=UNLOAD Dec 13 02:11:12.895000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:12.895000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:12.895000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:12.895000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:12.895000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:12.895000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:12.895000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:12.895000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:12.895000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:12.895000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:12.895000 audit: BPF prog-id=130 op=LOAD Dec 13 02:11:12.895000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003da448 items=0 ppid=2423 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:12.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034656238613163323430333735636561653238633464376436616230 Dec 13 02:11:12.943327 kubelet[2032]: E1213 02:11:12.941934 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:12.943327 kubelet[2032]: W1213 02:11:12.941971 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:12.943327 kubelet[2032]: E1213 02:11:12.942004 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:12.943327 kubelet[2032]: I1213 02:11:12.942052 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/f4842bfe-3151-4850-b245-0e4d809afe99-registration-dir\") pod \"csi-node-driver-8brk9\" (UID: \"f4842bfe-3151-4850-b245-0e4d809afe99\") " pod="calico-system/csi-node-driver-8brk9" Dec 13 02:11:12.943327 kubelet[2032]: E1213 02:11:12.942467 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:12.943327 kubelet[2032]: W1213 02:11:12.942490 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:12.943327 kubelet[2032]: E1213 02:11:12.942522 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:12.943327 kubelet[2032]: I1213 02:11:12.942555 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/f4842bfe-3151-4850-b245-0e4d809afe99-socket-dir\") pod \"csi-node-driver-8brk9\" (UID: \"f4842bfe-3151-4850-b245-0e4d809afe99\") " pod="calico-system/csi-node-driver-8brk9" Dec 13 02:11:12.943327 kubelet[2032]: E1213 02:11:12.942978 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:12.944495 kubelet[2032]: W1213 02:11:12.942997 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:12.944495 kubelet[2032]: E1213 02:11:12.943024 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:12.944495 kubelet[2032]: I1213 02:11:12.943056 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/f4842bfe-3151-4850-b245-0e4d809afe99-kubelet-dir\") pod \"csi-node-driver-8brk9\" (UID: \"f4842bfe-3151-4850-b245-0e4d809afe99\") " pod="calico-system/csi-node-driver-8brk9" Dec 13 02:11:12.944495 kubelet[2032]: E1213 02:11:12.943830 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:12.944495 kubelet[2032]: W1213 02:11:12.943851 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:12.945597 kubelet[2032]: E1213 02:11:12.944878 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:12.945597 kubelet[2032]: I1213 02:11:12.944930 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/f4842bfe-3151-4850-b245-0e4d809afe99-varrun\") pod \"csi-node-driver-8brk9\" (UID: \"f4842bfe-3151-4850-b245-0e4d809afe99\") " pod="calico-system/csi-node-driver-8brk9" Dec 13 02:11:12.945597 kubelet[2032]: E1213 02:11:12.945175 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:12.945597 kubelet[2032]: W1213 02:11:12.945190 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:12.945597 kubelet[2032]: E1213 02:11:12.945324 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:12.945597 kubelet[2032]: E1213 02:11:12.945522 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:12.945597 kubelet[2032]: W1213 02:11:12.945533 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:12.946529 kubelet[2032]: E1213 02:11:12.946070 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:12.946529 kubelet[2032]: E1213 02:11:12.946397 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:12.946529 kubelet[2032]: W1213 02:11:12.946413 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:12.947017 kubelet[2032]: E1213 02:11:12.946862 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:12.947230 kubelet[2032]: E1213 02:11:12.947211 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:12.947484 kubelet[2032]: W1213 02:11:12.947351 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:12.947649 kubelet[2032]: E1213 02:11:12.947625 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:12.947796 kubelet[2032]: I1213 02:11:12.947769 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4bbws\" (UniqueName: \"kubernetes.io/projected/f4842bfe-3151-4850-b245-0e4d809afe99-kube-api-access-4bbws\") pod \"csi-node-driver-8brk9\" (UID: \"f4842bfe-3151-4850-b245-0e4d809afe99\") " pod="calico-system/csi-node-driver-8brk9" Dec 13 02:11:12.948139 kubelet[2032]: E1213 02:11:12.948119 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:12.948297 kubelet[2032]: W1213 02:11:12.948275 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:12.948535 kubelet[2032]: E1213 02:11:12.948510 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:12.948945 kubelet[2032]: E1213 02:11:12.948925 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:12.949092 kubelet[2032]: W1213 02:11:12.949070 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:12.949210 kubelet[2032]: E1213 02:11:12.949190 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:12.949757 kubelet[2032]: E1213 02:11:12.949734 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:12.949914 kubelet[2032]: W1213 02:11:12.949891 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:12.950050 kubelet[2032]: E1213 02:11:12.950029 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:12.950493 kubelet[2032]: E1213 02:11:12.950471 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:12.950719 kubelet[2032]: W1213 02:11:12.950695 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:12.951657 kubelet[2032]: E1213 02:11:12.951628 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:12.955122 kubelet[2032]: E1213 02:11:12.955094 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:12.955360 kubelet[2032]: W1213 02:11:12.955337 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:12.955499 kubelet[2032]: E1213 02:11:12.955478 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:12.957749 kubelet[2032]: E1213 02:11:12.957724 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:12.957916 kubelet[2032]: W1213 02:11:12.957894 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:12.958045 kubelet[2032]: E1213 02:11:12.958023 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:12.959342 kubelet[2032]: E1213 02:11:12.959317 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:12.959486 kubelet[2032]: W1213 02:11:12.959464 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:12.959662 kubelet[2032]: E1213 02:11:12.959640 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:12.965541 env[1220]: time="2024-12-13T02:11:12.960415669Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-z8vb9,Uid:12da52d6-ae60-4220-8891-d93eb2e8d034,Namespace:calico-system,Attempt:0,}" Dec 13 02:11:12.976988 env[1220]: time="2024-12-13T02:11:12.976934287Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-bfc654496-54qwq,Uid:4b6c34b4-cbf1-4a62-9b60-e4dbe333d317,Namespace:calico-system,Attempt:0,} returns sandbox id \"04eb8a1c240375ceae28c4d7d6ab09a026f57eb626ba647968a8ebdfa892c858\"" Dec 13 02:11:12.980102 env[1220]: time="2024-12-13T02:11:12.980058645Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 02:11:13.014106 env[1220]: time="2024-12-13T02:11:13.008123093Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:11:13.014106 env[1220]: time="2024-12-13T02:11:13.008177993Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:11:13.014106 env[1220]: time="2024-12-13T02:11:13.008199510Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:11:13.014106 env[1220]: time="2024-12-13T02:11:13.008429496Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f3e6dda92d7ffa46ca75e93f3904b2dca781160ac02cd308b41501c50cbdd61e pid=2482 runtime=io.containerd.runc.v2 Dec 13 02:11:13.035495 systemd[1]: Started cri-containerd-f3e6dda92d7ffa46ca75e93f3904b2dca781160ac02cd308b41501c50cbdd61e.scope. Dec 13 02:11:13.058150 kubelet[2032]: E1213 02:11:13.056998 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:13.058150 kubelet[2032]: W1213 02:11:13.057035 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:13.058150 kubelet[2032]: E1213 02:11:13.057069 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:13.058150 kubelet[2032]: E1213 02:11:13.057486 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:13.058150 kubelet[2032]: W1213 02:11:13.057503 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:13.058150 kubelet[2032]: E1213 02:11:13.057534 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:13.058150 kubelet[2032]: E1213 02:11:13.057946 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:13.058150 kubelet[2032]: W1213 02:11:13.057963 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:13.058150 kubelet[2032]: E1213 02:11:13.057990 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:13.059263 kubelet[2032]: E1213 02:11:13.059112 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:13.059263 kubelet[2032]: W1213 02:11:13.059135 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:13.059689 kubelet[2032]: E1213 02:11:13.059474 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:13.059951 kubelet[2032]: E1213 02:11:13.059931 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:13.060210 kubelet[2032]: W1213 02:11:13.060067 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:13.060360 kubelet[2032]: E1213 02:11:13.060335 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:13.060756 kubelet[2032]: E1213 02:11:13.060735 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:13.060919 kubelet[2032]: W1213 02:11:13.060898 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:13.061170 kubelet[2032]: E1213 02:11:13.061145 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:13.061523 kubelet[2032]: E1213 02:11:13.061502 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:13.062826 kubelet[2032]: W1213 02:11:13.062789 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:13.063123 kubelet[2032]: E1213 02:11:13.063099 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:13.063697 kubelet[2032]: E1213 02:11:13.063675 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:13.063853 kubelet[2032]: W1213 02:11:13.063833 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:13.064120 kubelet[2032]: E1213 02:11:13.064089 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:13.064401 kubelet[2032]: E1213 02:11:13.064384 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:13.064548 kubelet[2032]: W1213 02:11:13.064530 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:13.064802 kubelet[2032]: E1213 02:11:13.064784 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:13.065113 kubelet[2032]: E1213 02:11:13.065097 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:13.065227 kubelet[2032]: W1213 02:11:13.065211 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:13.065441 kubelet[2032]: E1213 02:11:13.065420 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:13.065675 kubelet[2032]: E1213 02:11:13.065659 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:13.065788 kubelet[2032]: W1213 02:11:13.065770 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:13.066024 kubelet[2032]: E1213 02:11:13.066002 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:13.066217 kubelet[2032]: E1213 02:11:13.066202 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:13.066630 kubelet[2032]: W1213 02:11:13.066608 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:13.066885 kubelet[2032]: E1213 02:11:13.066863 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:13.067235 kubelet[2032]: E1213 02:11:13.067220 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:13.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:13.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:13.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:13.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:13.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:13.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:13.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:13.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:13.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:13.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:13.068000 audit: BPF prog-id=131 op=LOAD Dec 13 02:11:13.070000 audit[2490]: AVC avc: denied { bpf } for pid=2490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:13.071062 kubelet[2032]: W1213 02:11:13.071036 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:13.070000 audit[2490]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2482 pid=2490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:13.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633653664646139326437666661343663613735653933663339303462 Dec 13 02:11:13.071619 kubelet[2032]: E1213 02:11:13.071592 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:13.071000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:13.071000 audit[2490]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=2482 pid=2490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:13.071000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633653664646139326437666661343663613735653933663339303462 Dec 13 02:11:13.071000 audit[2490]: AVC avc: denied { bpf } for pid=2490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:13.071000 audit[2490]: AVC avc: denied { bpf } for pid=2490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:13.071000 audit[2490]: AVC avc: denied { bpf } for pid=2490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:13.071000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:13.071000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:13.071000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:13.071000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:13.071000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:13.071000 audit[2490]: AVC avc: denied { bpf } for pid=2490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:13.071000 audit[2490]: AVC avc: denied { bpf } for pid=2490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:13.071000 audit: BPF prog-id=132 op=LOAD Dec 13 02:11:13.071000 audit[2490]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c00039fe90 items=0 ppid=2482 pid=2490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:13.071000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633653664646139326437666661343663613735653933663339303462 Dec 13 02:11:13.074092 kubelet[2032]: E1213 02:11:13.073464 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:13.074092 kubelet[2032]: W1213 02:11:13.073487 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:13.074092 kubelet[2032]: E1213 02:11:13.073534 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:13.074612 kubelet[2032]: E1213 02:11:13.074590 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:13.074000 audit[2490]: AVC avc: denied { bpf } for pid=2490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:13.074000 audit[2490]: AVC avc: denied { bpf } for pid=2490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:13.074000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:13.074000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:13.074000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:13.074000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:13.074000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:13.074000 audit[2490]: AVC avc: denied { bpf } for pid=2490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:13.074000 audit[2490]: AVC avc: denied { bpf } for pid=2490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:13.074000 audit: BPF prog-id=133 op=LOAD Dec 13 02:11:13.074000 audit[2490]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c00039fed8 items=0 ppid=2482 pid=2490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:13.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633653664646139326437666661343663613735653933663339303462 Dec 13 02:11:13.075000 audit: BPF prog-id=133 op=UNLOAD Dec 13 02:11:13.075000 audit: BPF prog-id=132 op=UNLOAD Dec 13 02:11:13.075000 audit[2490]: AVC avc: denied { bpf } for pid=2490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:13.075000 audit[2490]: AVC avc: denied { bpf } for pid=2490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:13.075000 audit[2490]: AVC avc: denied { bpf } for pid=2490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:13.075000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:13.075000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:13.075000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:13.075000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:13.075000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:13.075000 audit[2490]: AVC avc: denied { bpf } for pid=2490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:13.075000 audit[2490]: AVC avc: denied { bpf } for pid=2490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:13.075000 audit: BPF prog-id=134 op=LOAD Dec 13 02:11:13.078867 kubelet[2032]: W1213 02:11:13.077610 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:13.078867 kubelet[2032]: E1213 02:11:13.078146 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:13.078867 kubelet[2032]: E1213 02:11:13.078406 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:13.078867 kubelet[2032]: W1213 02:11:13.078418 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:13.078867 kubelet[2032]: E1213 02:11:13.078737 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:13.078867 kubelet[2032]: W1213 02:11:13.078752 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:13.079551 kubelet[2032]: E1213 02:11:13.079438 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:13.079551 kubelet[2032]: W1213 02:11:13.079454 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:13.079942 kubelet[2032]: E1213 02:11:13.079923 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:13.075000 audit[2490]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0003fc2e8 items=0 ppid=2482 pid=2490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:13.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633653664646139326437666661343663613735653933663339303462 Dec 13 02:11:13.080646 kubelet[2032]: W1213 02:11:13.080456 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:13.081063 kubelet[2032]: E1213 02:11:13.081044 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:13.081213 kubelet[2032]: W1213 02:11:13.081192 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:13.081370 kubelet[2032]: E1213 02:11:13.081350 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:13.081521 kubelet[2032]: E1213 02:11:13.081502 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:13.081928 kubelet[2032]: E1213 02:11:13.081615 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:13.082084 kubelet[2032]: E1213 02:11:13.081626 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:13.082226 kubelet[2032]: E1213 02:11:13.081639 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:13.082984 kubelet[2032]: E1213 02:11:13.082963 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:13.083173 kubelet[2032]: W1213 02:11:13.083152 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:13.083302 kubelet[2032]: E1213 02:11:13.083284 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:13.083832 kubelet[2032]: E1213 02:11:13.083804 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:13.083963 kubelet[2032]: W1213 02:11:13.083944 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:13.084072 kubelet[2032]: E1213 02:11:13.084052 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:13.084779 kubelet[2032]: E1213 02:11:13.084758 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:13.084912 kubelet[2032]: W1213 02:11:13.084892 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:13.085024 kubelet[2032]: E1213 02:11:13.085005 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:13.085425 kubelet[2032]: E1213 02:11:13.085409 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:13.085541 kubelet[2032]: W1213 02:11:13.085524 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:13.085675 kubelet[2032]: E1213 02:11:13.085656 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:13.086414 kubelet[2032]: E1213 02:11:13.086393 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:13.086591 kubelet[2032]: W1213 02:11:13.086540 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:13.086709 kubelet[2032]: E1213 02:11:13.086686 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:13.109641 kubelet[2032]: E1213 02:11:13.108907 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:13.109641 kubelet[2032]: W1213 02:11:13.108945 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:13.109641 kubelet[2032]: E1213 02:11:13.108974 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:13.120298 env[1220]: time="2024-12-13T02:11:13.120222057Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-z8vb9,Uid:12da52d6-ae60-4220-8891-d93eb2e8d034,Namespace:calico-system,Attempt:0,} returns sandbox id \"f3e6dda92d7ffa46ca75e93f3904b2dca781160ac02cd308b41501c50cbdd61e\"" Dec 13 02:11:13.234000 audit[2544]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2544 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:11:13.234000 audit[2544]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffdb518fdc0 a2=0 a3=7ffdb518fdac items=0 ppid=2179 pid=2544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:13.234000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:11:13.242000 audit[2544]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2544 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:11:13.242000 audit[2544]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdb518fdc0 a2=0 a3=0 items=0 ppid=2179 pid=2544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:13.242000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:11:13.562487 systemd[1]: run-containerd-runc-k8s.io-04eb8a1c240375ceae28c4d7d6ab09a026f57eb626ba647968a8ebdfa892c858-runc.RBzfc1.mount: Deactivated successfully. Dec 13 02:11:13.980940 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2525011661.mount: Deactivated successfully. Dec 13 02:11:14.550148 kubelet[2032]: E1213 02:11:14.550079 2032 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8brk9" podUID="f4842bfe-3151-4850-b245-0e4d809afe99" Dec 13 02:11:15.031112 env[1220]: time="2024-12-13T02:11:15.031046300Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:11:15.034053 env[1220]: time="2024-12-13T02:11:15.034001294Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:11:15.036639 env[1220]: time="2024-12-13T02:11:15.036595364Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:11:15.038903 env[1220]: time="2024-12-13T02:11:15.038861014Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:11:15.043650 env[1220]: time="2024-12-13T02:11:15.042023375Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 02:11:15.047177 env[1220]: time="2024-12-13T02:11:15.047132852Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 02:11:15.076470 env[1220]: time="2024-12-13T02:11:15.076409901Z" level=info msg="CreateContainer within sandbox \"04eb8a1c240375ceae28c4d7d6ab09a026f57eb626ba647968a8ebdfa892c858\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 02:11:15.098140 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2682165038.mount: Deactivated successfully. Dec 13 02:11:15.111731 env[1220]: time="2024-12-13T02:11:15.108904744Z" level=info msg="CreateContainer within sandbox \"04eb8a1c240375ceae28c4d7d6ab09a026f57eb626ba647968a8ebdfa892c858\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"3f5490693aa4f7ab6387ecae9518ef55af714d132471d47b16a66e6830ac9848\"" Dec 13 02:11:15.111731 env[1220]: time="2024-12-13T02:11:15.110321799Z" level=info msg="StartContainer for \"3f5490693aa4f7ab6387ecae9518ef55af714d132471d47b16a66e6830ac9848\"" Dec 13 02:11:15.148131 systemd[1]: Started cri-containerd-3f5490693aa4f7ab6387ecae9518ef55af714d132471d47b16a66e6830ac9848.scope. Dec 13 02:11:15.219524 kernel: kauditd_printk_skb: 179 callbacks suppressed Dec 13 02:11:15.219748 kernel: audit: type=1400 audit(1734055875.210:871): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.258797 kernel: audit: type=1400 audit(1734055875.210:872): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.286669 kernel: audit: type=1400 audit(1734055875.210:873): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.318965 kernel: audit: type=1400 audit(1734055875.210:874): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.340635 kernel: audit: type=1400 audit(1734055875.210:875): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.340808 kernel: audit: type=1400 audit(1734055875.210:876): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.382794 kernel: audit: type=1400 audit(1734055875.210:877): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.404770 kernel: audit: type=1400 audit(1734055875.210:878): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.405236 env[1220]: time="2024-12-13T02:11:15.405147275Z" level=info msg="StartContainer for \"3f5490693aa4f7ab6387ecae9518ef55af714d132471d47b16a66e6830ac9848\" returns successfully" Dec 13 02:11:15.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.446745 kernel: audit: type=1400 audit(1734055875.210:879): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.446938 kernel: audit: type=1400 audit(1734055875.210:880): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.210000 audit: BPF prog-id=135 op=LOAD Dec 13 02:11:15.216000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.216000 audit[2556]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2423 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:15.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366353439303639336161346637616236333837656361653935313865 Dec 13 02:11:15.216000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.216000 audit[2556]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2423 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:15.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366353439303639336161346637616236333837656361653935313865 Dec 13 02:11:15.216000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.216000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.216000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.216000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.216000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.216000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.216000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.216000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.216000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.216000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.216000 audit: BPF prog-id=136 op=LOAD Dec 13 02:11:15.216000 audit[2556]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003b63b0 items=0 ppid=2423 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:15.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366353439303639336161346637616236333837656361653935313865 Dec 13 02:11:15.237000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.237000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.237000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.237000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.237000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.237000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.237000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.237000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.237000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.237000 audit: BPF prog-id=137 op=LOAD Dec 13 02:11:15.237000 audit[2556]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003b63f8 items=0 ppid=2423 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:15.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366353439303639336161346637616236333837656361653935313865 Dec 13 02:11:15.237000 audit: BPF prog-id=137 op=UNLOAD Dec 13 02:11:15.237000 audit: BPF prog-id=136 op=UNLOAD Dec 13 02:11:15.237000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.237000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.237000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.237000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.237000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.237000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.237000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.237000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.237000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.237000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:15.237000 audit: BPF prog-id=138 op=LOAD Dec 13 02:11:15.237000 audit[2556]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b6808 items=0 ppid=2423 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:15.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366353439303639336161346637616236333837656361653935313865 Dec 13 02:11:15.668477 kubelet[2032]: E1213 02:11:15.665455 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:15.669378 kubelet[2032]: W1213 02:11:15.669148 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:15.669378 kubelet[2032]: E1213 02:11:15.669200 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:15.669882 kubelet[2032]: E1213 02:11:15.669692 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:15.669882 kubelet[2032]: W1213 02:11:15.669716 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:15.669882 kubelet[2032]: E1213 02:11:15.669741 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:15.670370 kubelet[2032]: E1213 02:11:15.670194 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:15.670370 kubelet[2032]: W1213 02:11:15.670214 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:15.670370 kubelet[2032]: E1213 02:11:15.670235 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:15.670962 kubelet[2032]: E1213 02:11:15.670769 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:15.670962 kubelet[2032]: W1213 02:11:15.670791 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:15.670962 kubelet[2032]: E1213 02:11:15.670814 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:15.671466 kubelet[2032]: E1213 02:11:15.671289 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:15.671466 kubelet[2032]: W1213 02:11:15.671310 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:15.671466 kubelet[2032]: E1213 02:11:15.671330 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:15.671938 kubelet[2032]: E1213 02:11:15.671814 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:15.671938 kubelet[2032]: W1213 02:11:15.671835 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:15.671938 kubelet[2032]: E1213 02:11:15.671866 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:15.672551 kubelet[2032]: E1213 02:11:15.672529 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:15.672732 kubelet[2032]: W1213 02:11:15.672708 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:15.672934 kubelet[2032]: E1213 02:11:15.672845 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:15.673407 kubelet[2032]: E1213 02:11:15.673386 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:15.673599 kubelet[2032]: W1213 02:11:15.673549 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:15.673729 kubelet[2032]: E1213 02:11:15.673707 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:15.674441 kubelet[2032]: E1213 02:11:15.674408 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:15.674441 kubelet[2032]: W1213 02:11:15.674432 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:15.674644 kubelet[2032]: E1213 02:11:15.674464 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:15.674929 kubelet[2032]: E1213 02:11:15.674904 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:15.674929 kubelet[2032]: W1213 02:11:15.674926 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:15.675097 kubelet[2032]: E1213 02:11:15.674949 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:15.675332 kubelet[2032]: E1213 02:11:15.675308 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:15.675332 kubelet[2032]: W1213 02:11:15.675329 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:15.675483 kubelet[2032]: E1213 02:11:15.675349 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:15.675831 kubelet[2032]: E1213 02:11:15.675806 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:15.675831 kubelet[2032]: W1213 02:11:15.675829 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:15.676038 kubelet[2032]: E1213 02:11:15.675849 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:15.678384 kubelet[2032]: I1213 02:11:15.678329 2032 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-bfc654496-54qwq" podStartSLOduration=1.611323801 podStartE2EDuration="3.678309459s" podCreationTimestamp="2024-12-13 02:11:12 +0000 UTC" firstStartedPulling="2024-12-13 02:11:12.979059828 +0000 UTC m=+19.577530219" lastFinishedPulling="2024-12-13 02:11:15.046045483 +0000 UTC m=+21.644515877" observedRunningTime="2024-12-13 02:11:15.677129329 +0000 UTC m=+22.275599746" watchObservedRunningTime="2024-12-13 02:11:15.678309459 +0000 UTC m=+22.276779868" Dec 13 02:11:15.679940 kubelet[2032]: E1213 02:11:15.679904 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:15.679940 kubelet[2032]: W1213 02:11:15.679928 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:15.680117 kubelet[2032]: E1213 02:11:15.679950 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:15.680406 kubelet[2032]: E1213 02:11:15.680383 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:15.680406 kubelet[2032]: W1213 02:11:15.680403 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:15.680601 kubelet[2032]: E1213 02:11:15.680423 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:15.680915 kubelet[2032]: E1213 02:11:15.680892 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:15.680915 kubelet[2032]: W1213 02:11:15.680914 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:15.681079 kubelet[2032]: E1213 02:11:15.680937 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:15.684144 kubelet[2032]: E1213 02:11:15.684118 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:15.684144 kubelet[2032]: W1213 02:11:15.684140 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:15.684349 kubelet[2032]: E1213 02:11:15.684165 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:15.684645 kubelet[2032]: E1213 02:11:15.684550 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:15.685195 kubelet[2032]: W1213 02:11:15.685163 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:15.685375 kubelet[2032]: E1213 02:11:15.685207 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:15.685897 kubelet[2032]: E1213 02:11:15.685771 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:15.685897 kubelet[2032]: W1213 02:11:15.685793 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:15.685897 kubelet[2032]: E1213 02:11:15.685821 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:15.686358 kubelet[2032]: E1213 02:11:15.686335 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:15.686358 kubelet[2032]: W1213 02:11:15.686356 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:15.686530 kubelet[2032]: E1213 02:11:15.686499 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:15.686867 kubelet[2032]: E1213 02:11:15.686844 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:15.686867 kubelet[2032]: W1213 02:11:15.686863 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:15.687036 kubelet[2032]: E1213 02:11:15.687008 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:15.687333 kubelet[2032]: E1213 02:11:15.687297 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:15.687333 kubelet[2032]: W1213 02:11:15.687316 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:15.687507 kubelet[2032]: E1213 02:11:15.687448 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:15.687876 kubelet[2032]: E1213 02:11:15.687839 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:15.687876 kubelet[2032]: W1213 02:11:15.687860 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:15.688101 kubelet[2032]: E1213 02:11:15.687885 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:15.688391 kubelet[2032]: E1213 02:11:15.688355 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:15.688391 kubelet[2032]: W1213 02:11:15.688376 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:15.688597 kubelet[2032]: E1213 02:11:15.688549 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:15.688960 kubelet[2032]: E1213 02:11:15.688935 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:15.688960 kubelet[2032]: W1213 02:11:15.688955 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:15.689224 kubelet[2032]: E1213 02:11:15.689107 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:15.689762 kubelet[2032]: E1213 02:11:15.689735 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:15.690672 kubelet[2032]: W1213 02:11:15.690645 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:15.690979 kubelet[2032]: E1213 02:11:15.690957 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:15.691364 kubelet[2032]: E1213 02:11:15.691341 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:15.691364 kubelet[2032]: W1213 02:11:15.691361 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:15.692186 kubelet[2032]: E1213 02:11:15.691486 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:15.692629 kubelet[2032]: E1213 02:11:15.692606 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:15.692629 kubelet[2032]: W1213 02:11:15.692628 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:15.692901 kubelet[2032]: E1213 02:11:15.692758 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:15.693381 kubelet[2032]: E1213 02:11:15.693358 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:15.693381 kubelet[2032]: W1213 02:11:15.693376 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:15.693709 kubelet[2032]: E1213 02:11:15.693518 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:15.693818 kubelet[2032]: E1213 02:11:15.693800 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:15.693818 kubelet[2032]: W1213 02:11:15.693813 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:15.694095 kubelet[2032]: E1213 02:11:15.693964 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:15.694196 kubelet[2032]: E1213 02:11:15.694172 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:15.694196 kubelet[2032]: W1213 02:11:15.694184 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:15.694438 kubelet[2032]: E1213 02:11:15.694314 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:15.695087 kubelet[2032]: E1213 02:11:15.695066 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:15.695285 kubelet[2032]: W1213 02:11:15.695262 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:15.695495 kubelet[2032]: E1213 02:11:15.695451 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:15.696269 kubelet[2032]: E1213 02:11:15.696249 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:15.696486 kubelet[2032]: W1213 02:11:15.696439 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:15.696837 kubelet[2032]: E1213 02:11:15.696744 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:15.697677 kubelet[2032]: E1213 02:11:15.697550 2032 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:11:15.697942 kubelet[2032]: W1213 02:11:15.697918 2032 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:11:15.699963 kubelet[2032]: E1213 02:11:15.699938 2032 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:11:16.069335 env[1220]: time="2024-12-13T02:11:16.069255238Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:11:16.072233 env[1220]: time="2024-12-13T02:11:16.072186441Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:11:16.074352 env[1220]: time="2024-12-13T02:11:16.074302094Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:11:16.076426 env[1220]: time="2024-12-13T02:11:16.076387678Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:11:16.077191 env[1220]: time="2024-12-13T02:11:16.077138920Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 02:11:16.083384 env[1220]: time="2024-12-13T02:11:16.083331957Z" level=info msg="CreateContainer within sandbox \"f3e6dda92d7ffa46ca75e93f3904b2dca781160ac02cd308b41501c50cbdd61e\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 02:11:16.102812 env[1220]: time="2024-12-13T02:11:16.102713925Z" level=info msg="CreateContainer within sandbox \"f3e6dda92d7ffa46ca75e93f3904b2dca781160ac02cd308b41501c50cbdd61e\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"849f3f13f8f873873fac188c941ad33675f219197487404335247f85101eca8c\"" Dec 13 02:11:16.105824 env[1220]: time="2024-12-13T02:11:16.105727862Z" level=info msg="StartContainer for \"849f3f13f8f873873fac188c941ad33675f219197487404335247f85101eca8c\"" Dec 13 02:11:16.167656 systemd[1]: run-containerd-runc-k8s.io-849f3f13f8f873873fac188c941ad33675f219197487404335247f85101eca8c-runc.sO6iSO.mount: Deactivated successfully. Dec 13 02:11:16.175274 systemd[1]: Started cri-containerd-849f3f13f8f873873fac188c941ad33675f219197487404335247f85101eca8c.scope. Dec 13 02:11:16.196000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:16.196000 audit[2630]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fa6c32722f8 items=0 ppid=2482 pid=2630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:16.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834396633663133663866383733383733666163313838633934316164 Dec 13 02:11:16.196000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:16.196000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:16.196000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:16.196000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:16.196000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:16.196000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:16.196000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:16.196000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:16.196000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:16.196000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:16.196000 audit: BPF prog-id=139 op=LOAD Dec 13 02:11:16.196000 audit[2630]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000024718 items=0 ppid=2482 pid=2630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:16.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834396633663133663866383733383733666163313838633934316164 Dec 13 02:11:16.196000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:16.196000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:16.196000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:16.196000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:16.196000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:16.196000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:16.196000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:16.196000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:16.196000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:16.196000 audit: BPF prog-id=140 op=LOAD Dec 13 02:11:16.196000 audit[2630]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000024768 items=0 ppid=2482 pid=2630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:16.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834396633663133663866383733383733666163313838633934316164 Dec 13 02:11:16.196000 audit: BPF prog-id=140 op=UNLOAD Dec 13 02:11:16.196000 audit: BPF prog-id=139 op=UNLOAD Dec 13 02:11:16.196000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:16.196000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:16.196000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:16.196000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:16.196000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:16.196000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:16.196000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:16.196000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:16.196000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:16.196000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:16.196000 audit: BPF prog-id=141 op=LOAD Dec 13 02:11:16.196000 audit[2630]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0000247f8 items=0 ppid=2482 pid=2630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:16.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834396633663133663866383733383733666163313838633934316164 Dec 13 02:11:16.223727 env[1220]: time="2024-12-13T02:11:16.223656751Z" level=info msg="StartContainer for \"849f3f13f8f873873fac188c941ad33675f219197487404335247f85101eca8c\" returns successfully" Dec 13 02:11:16.246348 systemd[1]: cri-containerd-849f3f13f8f873873fac188c941ad33675f219197487404335247f85101eca8c.scope: Deactivated successfully. Dec 13 02:11:16.251000 audit: BPF prog-id=141 op=UNLOAD Dec 13 02:11:16.549079 kubelet[2032]: E1213 02:11:16.549011 2032 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8brk9" podUID="f4842bfe-3151-4850-b245-0e4d809afe99" Dec 13 02:11:16.661425 kubelet[2032]: I1213 02:11:16.661377 2032 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:11:16.883079 env[1220]: time="2024-12-13T02:11:16.882919651Z" level=info msg="shim disconnected" id=849f3f13f8f873873fac188c941ad33675f219197487404335247f85101eca8c Dec 13 02:11:16.883448 env[1220]: time="2024-12-13T02:11:16.883399604Z" level=warning msg="cleaning up after shim disconnected" id=849f3f13f8f873873fac188c941ad33675f219197487404335247f85101eca8c namespace=k8s.io Dec 13 02:11:16.884078 env[1220]: time="2024-12-13T02:11:16.883581303Z" level=info msg="cleaning up dead shim" Dec 13 02:11:16.897082 env[1220]: time="2024-12-13T02:11:16.897005192Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:11:16Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2677 runtime=io.containerd.runc.v2\n" Dec 13 02:11:17.059308 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-849f3f13f8f873873fac188c941ad33675f219197487404335247f85101eca8c-rootfs.mount: Deactivated successfully. Dec 13 02:11:17.671879 env[1220]: time="2024-12-13T02:11:17.671826224Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 02:11:18.448355 kubelet[2032]: I1213 02:11:18.448104 2032 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:11:18.530000 audit[2690]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2690 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:11:18.530000 audit[2690]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffed8981d00 a2=0 a3=7ffed8981cec items=0 ppid=2179 pid=2690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:18.530000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:11:18.534000 audit[2690]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2690 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:11:18.534000 audit[2690]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffed8981d00 a2=0 a3=7ffed8981cec items=0 ppid=2179 pid=2690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:18.534000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:11:18.549854 kubelet[2032]: E1213 02:11:18.549774 2032 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8brk9" podUID="f4842bfe-3151-4850-b245-0e4d809afe99" Dec 13 02:11:20.548838 kubelet[2032]: E1213 02:11:20.548782 2032 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8brk9" podUID="f4842bfe-3151-4850-b245-0e4d809afe99" Dec 13 02:11:22.135537 env[1220]: time="2024-12-13T02:11:22.135467049Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:11:22.138289 env[1220]: time="2024-12-13T02:11:22.138239488Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:11:22.140652 env[1220]: time="2024-12-13T02:11:22.140610049Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:11:22.142660 env[1220]: time="2024-12-13T02:11:22.142620171Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:11:22.143372 env[1220]: time="2024-12-13T02:11:22.143329276Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 02:11:22.147940 env[1220]: time="2024-12-13T02:11:22.147867803Z" level=info msg="CreateContainer within sandbox \"f3e6dda92d7ffa46ca75e93f3904b2dca781160ac02cd308b41501c50cbdd61e\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 02:11:22.170504 env[1220]: time="2024-12-13T02:11:22.170440229Z" level=info msg="CreateContainer within sandbox \"f3e6dda92d7ffa46ca75e93f3904b2dca781160ac02cd308b41501c50cbdd61e\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"5472fbc0ebc97c5a180051c8579a601bca51e00deadadfaa206b9ad1e1ecfb0f\"" Dec 13 02:11:22.171446 env[1220]: time="2024-12-13T02:11:22.171406746Z" level=info msg="StartContainer for \"5472fbc0ebc97c5a180051c8579a601bca51e00deadadfaa206b9ad1e1ecfb0f\"" Dec 13 02:11:22.218764 systemd[1]: Started cri-containerd-5472fbc0ebc97c5a180051c8579a601bca51e00deadadfaa206b9ad1e1ecfb0f.scope. Dec 13 02:11:22.253246 kernel: kauditd_printk_skb: 97 callbacks suppressed Dec 13 02:11:22.253485 kernel: audit: type=1400 audit(1734055882.242:898): avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:22.242000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:22.242000 audit[2700]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fb1d560bcb8 items=0 ppid=2482 pid=2700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:22.304869 kernel: audit: type=1300 audit(1734055882.242:898): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fb1d560bcb8 items=0 ppid=2482 pid=2700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:22.305092 kernel: audit: type=1327 audit(1734055882.242:898): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534373266626330656263393763356131383030353163383537396136 Dec 13 02:11:22.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534373266626330656263393763356131383030353163383537396136 Dec 13 02:11:22.242000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:22.378247 kernel: audit: type=1400 audit(1734055882.242:899): avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:22.379453 kernel: audit: type=1400 audit(1734055882.242:899): avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:22.379519 kernel: audit: type=1400 audit(1734055882.242:899): avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:22.242000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:22.242000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:22.385904 env[1220]: time="2024-12-13T02:11:22.385774051Z" level=info msg="StartContainer for \"5472fbc0ebc97c5a180051c8579a601bca51e00deadadfaa206b9ad1e1ecfb0f\" returns successfully" Dec 13 02:11:22.242000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:22.419768 kernel: audit: type=1400 audit(1734055882.242:899): avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:22.242000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:22.443614 kernel: audit: type=1400 audit(1734055882.242:899): avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:22.242000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:22.467622 kernel: audit: type=1400 audit(1734055882.242:899): avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:22.242000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:22.489604 kernel: audit: type=1400 audit(1734055882.242:899): avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:22.242000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:22.242000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:22.242000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:22.242000 audit: BPF prog-id=142 op=LOAD Dec 13 02:11:22.242000 audit[2700]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001b67c8 items=0 ppid=2482 pid=2700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:22.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534373266626330656263393763356131383030353163383537396136 Dec 13 02:11:22.242000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:22.242000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:22.242000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:22.242000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:22.242000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:22.242000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:22.242000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:22.242000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:22.242000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:22.242000 audit: BPF prog-id=143 op=LOAD Dec 13 02:11:22.242000 audit[2700]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001b6818 items=0 ppid=2482 pid=2700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:22.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534373266626330656263393763356131383030353163383537396136 Dec 13 02:11:22.242000 audit: BPF prog-id=143 op=UNLOAD Dec 13 02:11:22.242000 audit: BPF prog-id=142 op=UNLOAD Dec 13 02:11:22.242000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:22.242000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:22.242000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:22.242000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:22.242000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:22.242000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:22.242000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:22.242000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:22.242000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:22.242000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:22.242000 audit: BPF prog-id=144 op=LOAD Dec 13 02:11:22.242000 audit[2700]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001b68a8 items=0 ppid=2482 pid=2700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:22.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534373266626330656263393763356131383030353163383537396136 Dec 13 02:11:22.550589 kubelet[2032]: E1213 02:11:22.548967 2032 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8brk9" podUID="f4842bfe-3151-4850-b245-0e4d809afe99" Dec 13 02:11:23.311147 env[1220]: time="2024-12-13T02:11:23.310948911Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 02:11:23.314011 systemd[1]: cri-containerd-5472fbc0ebc97c5a180051c8579a601bca51e00deadadfaa206b9ad1e1ecfb0f.scope: Deactivated successfully. Dec 13 02:11:23.317000 audit: BPF prog-id=144 op=UNLOAD Dec 13 02:11:23.353538 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5472fbc0ebc97c5a180051c8579a601bca51e00deadadfaa206b9ad1e1ecfb0f-rootfs.mount: Deactivated successfully. Dec 13 02:11:23.394468 kubelet[2032]: I1213 02:11:23.394205 2032 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Dec 13 02:11:23.440919 kubelet[2032]: I1213 02:11:23.440859 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/38e5368d-879b-4625-afd4-c27aa522644e-config-volume\") pod \"coredns-6f6b679f8f-4qxgx\" (UID: \"38e5368d-879b-4625-afd4-c27aa522644e\") " pod="kube-system/coredns-6f6b679f8f-4qxgx" Dec 13 02:11:23.441131 kubelet[2032]: I1213 02:11:23.440935 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-958vg\" (UniqueName: \"kubernetes.io/projected/38e5368d-879b-4625-afd4-c27aa522644e-kube-api-access-958vg\") pod \"coredns-6f6b679f8f-4qxgx\" (UID: \"38e5368d-879b-4625-afd4-c27aa522644e\") " pod="kube-system/coredns-6f6b679f8f-4qxgx" Dec 13 02:11:23.445997 systemd[1]: Created slice kubepods-burstable-pod38e5368d_879b_4625_afd4_c27aa522644e.slice. Dec 13 02:11:23.450882 kubelet[2032]: W1213 02:11:23.450841 2032 reflector.go:561] object-"kube-system"/"coredns": failed to list *v1.ConfigMap: configmaps "coredns" is forbidden: User "system:node:ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal' and this object Dec 13 02:11:23.451082 kubelet[2032]: E1213 02:11:23.450901 2032 reflector.go:158] "Unhandled Error" err="object-\"kube-system\"/\"coredns\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"coredns\" is forbidden: User \"system:node:ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"kube-system\": no relationship found between node 'ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal' and this object" logger="UnhandledError" Dec 13 02:11:23.466430 systemd[1]: Created slice kubepods-burstable-podec6f24db_6064_4eab_a0e1_277f9824d7e5.slice. Dec 13 02:11:23.480508 systemd[1]: Created slice kubepods-besteffort-pod9822e74c_ada1_4078_8969_5a4ec5af77af.slice. Dec 13 02:11:23.498528 systemd[1]: Created slice kubepods-besteffort-pod7c7a4d1e_cded_4c6b_9d19_1c05bd20a799.slice. Dec 13 02:11:23.505477 systemd[1]: Created slice kubepods-besteffort-podf5765683_2ccd_4f71_9c39_d946c348ae32.slice. Dec 13 02:11:23.643603 kubelet[2032]: I1213 02:11:23.643369 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/ec6f24db-6064-4eab-a0e1-277f9824d7e5-config-volume\") pod \"coredns-6f6b679f8f-q8jtg\" (UID: \"ec6f24db-6064-4eab-a0e1-277f9824d7e5\") " pod="kube-system/coredns-6f6b679f8f-q8jtg" Dec 13 02:11:23.644517 kubelet[2032]: I1213 02:11:23.644468 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dtd8h\" (UniqueName: \"kubernetes.io/projected/7c7a4d1e-cded-4c6b-9d19-1c05bd20a799-kube-api-access-dtd8h\") pod \"calico-apiserver-7589d484d8-t9c25\" (UID: \"7c7a4d1e-cded-4c6b-9d19-1c05bd20a799\") " pod="calico-apiserver/calico-apiserver-7589d484d8-t9c25" Dec 13 02:11:23.644808 kubelet[2032]: I1213 02:11:23.644760 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qwxjq\" (UniqueName: \"kubernetes.io/projected/ec6f24db-6064-4eab-a0e1-277f9824d7e5-kube-api-access-qwxjq\") pod \"coredns-6f6b679f8f-q8jtg\" (UID: \"ec6f24db-6064-4eab-a0e1-277f9824d7e5\") " pod="kube-system/coredns-6f6b679f8f-q8jtg" Dec 13 02:11:23.645021 kubelet[2032]: I1213 02:11:23.644985 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/f5765683-2ccd-4f71-9c39-d946c348ae32-calico-apiserver-certs\") pod \"calico-apiserver-7589d484d8-nbqzv\" (UID: \"f5765683-2ccd-4f71-9c39-d946c348ae32\") " pod="calico-apiserver/calico-apiserver-7589d484d8-nbqzv" Dec 13 02:11:23.645233 kubelet[2032]: I1213 02:11:23.645186 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/9822e74c-ada1-4078-8969-5a4ec5af77af-tigera-ca-bundle\") pod \"calico-kube-controllers-665858c48b-kkf7t\" (UID: \"9822e74c-ada1-4078-8969-5a4ec5af77af\") " pod="calico-system/calico-kube-controllers-665858c48b-kkf7t" Dec 13 02:11:23.645610 kubelet[2032]: I1213 02:11:23.645512 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/7c7a4d1e-cded-4c6b-9d19-1c05bd20a799-calico-apiserver-certs\") pod \"calico-apiserver-7589d484d8-t9c25\" (UID: \"7c7a4d1e-cded-4c6b-9d19-1c05bd20a799\") " pod="calico-apiserver/calico-apiserver-7589d484d8-t9c25" Dec 13 02:11:23.645741 kubelet[2032]: I1213 02:11:23.645620 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9tbth\" (UniqueName: \"kubernetes.io/projected/f5765683-2ccd-4f71-9c39-d946c348ae32-kube-api-access-9tbth\") pod \"calico-apiserver-7589d484d8-nbqzv\" (UID: \"f5765683-2ccd-4f71-9c39-d946c348ae32\") " pod="calico-apiserver/calico-apiserver-7589d484d8-nbqzv" Dec 13 02:11:23.645819 kubelet[2032]: I1213 02:11:23.645763 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jj67n\" (UniqueName: \"kubernetes.io/projected/9822e74c-ada1-4078-8969-5a4ec5af77af-kube-api-access-jj67n\") pod \"calico-kube-controllers-665858c48b-kkf7t\" (UID: \"9822e74c-ada1-4078-8969-5a4ec5af77af\") " pod="calico-system/calico-kube-controllers-665858c48b-kkf7t" Dec 13 02:11:23.873540 env[1220]: time="2024-12-13T02:11:23.873413456Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7589d484d8-t9c25,Uid:7c7a4d1e-cded-4c6b-9d19-1c05bd20a799,Namespace:calico-apiserver,Attempt:0,}" Dec 13 02:11:23.874199 env[1220]: time="2024-12-13T02:11:23.873417872Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7589d484d8-nbqzv,Uid:f5765683-2ccd-4f71-9c39-d946c348ae32,Namespace:calico-apiserver,Attempt:0,}" Dec 13 02:11:24.089491 env[1220]: time="2024-12-13T02:11:24.089408023Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-665858c48b-kkf7t,Uid:9822e74c-ada1-4078-8969-5a4ec5af77af,Namespace:calico-system,Attempt:0,}" Dec 13 02:11:24.132304 env[1220]: time="2024-12-13T02:11:24.132228011Z" level=info msg="shim disconnected" id=5472fbc0ebc97c5a180051c8579a601bca51e00deadadfaa206b9ad1e1ecfb0f Dec 13 02:11:24.132586 env[1220]: time="2024-12-13T02:11:24.132536203Z" level=warning msg="cleaning up after shim disconnected" id=5472fbc0ebc97c5a180051c8579a601bca51e00deadadfaa206b9ad1e1ecfb0f namespace=k8s.io Dec 13 02:11:24.132742 env[1220]: time="2024-12-13T02:11:24.132710954Z" level=info msg="cleaning up dead shim" Dec 13 02:11:24.147645 env[1220]: time="2024-12-13T02:11:24.147590693Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:11:24Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2746 runtime=io.containerd.runc.v2\n" Dec 13 02:11:24.281442 env[1220]: time="2024-12-13T02:11:24.281240470Z" level=error msg="Failed to destroy network for sandbox \"21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:11:24.281816 env[1220]: time="2024-12-13T02:11:24.281759251Z" level=error msg="encountered an error cleaning up failed sandbox \"21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:11:24.281958 env[1220]: time="2024-12-13T02:11:24.281850223Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7589d484d8-nbqzv,Uid:f5765683-2ccd-4f71-9c39-d946c348ae32,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:11:24.282297 kubelet[2032]: E1213 02:11:24.282211 2032 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:11:24.282476 kubelet[2032]: E1213 02:11:24.282323 2032 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7589d484d8-nbqzv" Dec 13 02:11:24.282476 kubelet[2032]: E1213 02:11:24.282366 2032 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7589d484d8-nbqzv" Dec 13 02:11:24.283133 kubelet[2032]: E1213 02:11:24.282485 2032 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7589d484d8-nbqzv_calico-apiserver(f5765683-2ccd-4f71-9c39-d946c348ae32)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7589d484d8-nbqzv_calico-apiserver(f5765683-2ccd-4f71-9c39-d946c348ae32)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7589d484d8-nbqzv" podUID="f5765683-2ccd-4f71-9c39-d946c348ae32" Dec 13 02:11:24.331378 env[1220]: time="2024-12-13T02:11:24.331286627Z" level=error msg="Failed to destroy network for sandbox \"c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:11:24.331953 env[1220]: time="2024-12-13T02:11:24.331796140Z" level=error msg="encountered an error cleaning up failed sandbox \"c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:11:24.331953 env[1220]: time="2024-12-13T02:11:24.331884416Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-665858c48b-kkf7t,Uid:9822e74c-ada1-4078-8969-5a4ec5af77af,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:11:24.332210 kubelet[2032]: E1213 02:11:24.332159 2032 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:11:24.332352 kubelet[2032]: E1213 02:11:24.332246 2032 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-665858c48b-kkf7t" Dec 13 02:11:24.332352 kubelet[2032]: E1213 02:11:24.332279 2032 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-665858c48b-kkf7t" Dec 13 02:11:24.332470 kubelet[2032]: E1213 02:11:24.332339 2032 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-665858c48b-kkf7t_calico-system(9822e74c-ada1-4078-8969-5a4ec5af77af)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-665858c48b-kkf7t_calico-system(9822e74c-ada1-4078-8969-5a4ec5af77af)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-665858c48b-kkf7t" podUID="9822e74c-ada1-4078-8969-5a4ec5af77af" Dec 13 02:11:24.342262 env[1220]: time="2024-12-13T02:11:24.342090459Z" level=error msg="Failed to destroy network for sandbox \"bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:11:24.343781 env[1220]: time="2024-12-13T02:11:24.343720002Z" level=error msg="encountered an error cleaning up failed sandbox \"bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:11:24.343937 env[1220]: time="2024-12-13T02:11:24.343806221Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7589d484d8-t9c25,Uid:7c7a4d1e-cded-4c6b-9d19-1c05bd20a799,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:11:24.344277 kubelet[2032]: E1213 02:11:24.344218 2032 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:11:24.344394 kubelet[2032]: E1213 02:11:24.344319 2032 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7589d484d8-t9c25" Dec 13 02:11:24.344394 kubelet[2032]: E1213 02:11:24.344374 2032 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7589d484d8-t9c25" Dec 13 02:11:24.344612 kubelet[2032]: E1213 02:11:24.344465 2032 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7589d484d8-t9c25_calico-apiserver(7c7a4d1e-cded-4c6b-9d19-1c05bd20a799)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7589d484d8-t9c25_calico-apiserver(7c7a4d1e-cded-4c6b-9d19-1c05bd20a799)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7589d484d8-t9c25" podUID="7c7a4d1e-cded-4c6b-9d19-1c05bd20a799" Dec 13 02:11:24.542984 kubelet[2032]: E1213 02:11:24.542916 2032 configmap.go:193] Couldn't get configMap kube-system/coredns: failed to sync configmap cache: timed out waiting for the condition Dec 13 02:11:24.543209 kubelet[2032]: E1213 02:11:24.543058 2032 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/38e5368d-879b-4625-afd4-c27aa522644e-config-volume podName:38e5368d-879b-4625-afd4-c27aa522644e nodeName:}" failed. No retries permitted until 2024-12-13 02:11:25.043032203 +0000 UTC m=+31.641502607 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "config-volume" (UniqueName: "kubernetes.io/configmap/38e5368d-879b-4625-afd4-c27aa522644e-config-volume") pod "coredns-6f6b679f8f-4qxgx" (UID: "38e5368d-879b-4625-afd4-c27aa522644e") : failed to sync configmap cache: timed out waiting for the condition Dec 13 02:11:24.555432 systemd[1]: Created slice kubepods-besteffort-podf4842bfe_3151_4850_b245_0e4d809afe99.slice. Dec 13 02:11:24.560118 env[1220]: time="2024-12-13T02:11:24.560066380Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-8brk9,Uid:f4842bfe-3151-4850-b245-0e4d809afe99,Namespace:calico-system,Attempt:0,}" Dec 13 02:11:24.657892 env[1220]: time="2024-12-13T02:11:24.657668872Z" level=error msg="Failed to destroy network for sandbox \"45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:11:24.662407 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e-shm.mount: Deactivated successfully. Dec 13 02:11:24.664724 env[1220]: time="2024-12-13T02:11:24.664306549Z" level=error msg="encountered an error cleaning up failed sandbox \"45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:11:24.664724 env[1220]: time="2024-12-13T02:11:24.664614053Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-8brk9,Uid:f4842bfe-3151-4850-b245-0e4d809afe99,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:11:24.665073 kubelet[2032]: E1213 02:11:24.665022 2032 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:11:24.665729 kubelet[2032]: E1213 02:11:24.665103 2032 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-8brk9" Dec 13 02:11:24.665729 kubelet[2032]: E1213 02:11:24.665134 2032 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-8brk9" Dec 13 02:11:24.665729 kubelet[2032]: E1213 02:11:24.665202 2032 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-8brk9_calico-system(f4842bfe-3151-4850-b245-0e4d809afe99)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-8brk9_calico-system(f4842bfe-3151-4850-b245-0e4d809afe99)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-8brk9" podUID="f4842bfe-3151-4850-b245-0e4d809afe99" Dec 13 02:11:24.685986 env[1220]: time="2024-12-13T02:11:24.685931118Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-q8jtg,Uid:ec6f24db-6064-4eab-a0e1-277f9824d7e5,Namespace:kube-system,Attempt:0,}" Dec 13 02:11:24.689364 kubelet[2032]: I1213 02:11:24.688890 2032 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d" Dec 13 02:11:24.691182 env[1220]: time="2024-12-13T02:11:24.690291773Z" level=info msg="StopPodSandbox for \"bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d\"" Dec 13 02:11:24.692824 kubelet[2032]: I1213 02:11:24.692069 2032 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e" Dec 13 02:11:24.692994 env[1220]: time="2024-12-13T02:11:24.692954493Z" level=info msg="StopPodSandbox for \"45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e\"" Dec 13 02:11:24.705934 env[1220]: time="2024-12-13T02:11:24.702297597Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 02:11:24.705934 env[1220]: time="2024-12-13T02:11:24.703908251Z" level=info msg="StopPodSandbox for \"c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae\"" Dec 13 02:11:24.706219 kubelet[2032]: I1213 02:11:24.702911 2032 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" Dec 13 02:11:24.710830 kubelet[2032]: I1213 02:11:24.708948 2032 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf" Dec 13 02:11:24.710989 env[1220]: time="2024-12-13T02:11:24.710871387Z" level=info msg="StopPodSandbox for \"21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf\"" Dec 13 02:11:24.869651 env[1220]: time="2024-12-13T02:11:24.869554881Z" level=error msg="StopPodSandbox for \"45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e\" failed" error="failed to destroy network for sandbox \"45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:11:24.870206 kubelet[2032]: E1213 02:11:24.870155 2032 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e" Dec 13 02:11:24.870390 kubelet[2032]: E1213 02:11:24.870236 2032 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e"} Dec 13 02:11:24.870390 kubelet[2032]: E1213 02:11:24.870326 2032 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f4842bfe-3151-4850-b245-0e4d809afe99\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:11:24.870390 kubelet[2032]: E1213 02:11:24.870362 2032 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f4842bfe-3151-4850-b245-0e4d809afe99\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-8brk9" podUID="f4842bfe-3151-4850-b245-0e4d809afe99" Dec 13 02:11:24.891126 env[1220]: time="2024-12-13T02:11:24.891040134Z" level=error msg="StopPodSandbox for \"21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf\" failed" error="failed to destroy network for sandbox \"21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:11:24.892152 kubelet[2032]: E1213 02:11:24.891520 2032 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf" Dec 13 02:11:24.892152 kubelet[2032]: E1213 02:11:24.891620 2032 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf"} Dec 13 02:11:24.892152 kubelet[2032]: E1213 02:11:24.891688 2032 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f5765683-2ccd-4f71-9c39-d946c348ae32\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:11:24.892152 kubelet[2032]: E1213 02:11:24.891724 2032 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f5765683-2ccd-4f71-9c39-d946c348ae32\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7589d484d8-nbqzv" podUID="f5765683-2ccd-4f71-9c39-d946c348ae32" Dec 13 02:11:24.896833 env[1220]: time="2024-12-13T02:11:24.896771720Z" level=error msg="StopPodSandbox for \"bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d\" failed" error="failed to destroy network for sandbox \"bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:11:24.897482 kubelet[2032]: E1213 02:11:24.897248 2032 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d" Dec 13 02:11:24.897482 kubelet[2032]: E1213 02:11:24.897310 2032 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d"} Dec 13 02:11:24.897482 kubelet[2032]: E1213 02:11:24.897366 2032 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7c7a4d1e-cded-4c6b-9d19-1c05bd20a799\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:11:24.897482 kubelet[2032]: E1213 02:11:24.897412 2032 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7c7a4d1e-cded-4c6b-9d19-1c05bd20a799\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7589d484d8-t9c25" podUID="7c7a4d1e-cded-4c6b-9d19-1c05bd20a799" Dec 13 02:11:24.902371 env[1220]: time="2024-12-13T02:11:24.902308124Z" level=error msg="StopPodSandbox for \"c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae\" failed" error="failed to destroy network for sandbox \"c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:11:24.903038 kubelet[2032]: E1213 02:11:24.902799 2032 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" Dec 13 02:11:24.903038 kubelet[2032]: E1213 02:11:24.902859 2032 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae"} Dec 13 02:11:24.903038 kubelet[2032]: E1213 02:11:24.902910 2032 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9822e74c-ada1-4078-8969-5a4ec5af77af\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:11:24.903038 kubelet[2032]: E1213 02:11:24.902945 2032 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9822e74c-ada1-4078-8969-5a4ec5af77af\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-665858c48b-kkf7t" podUID="9822e74c-ada1-4078-8969-5a4ec5af77af" Dec 13 02:11:24.930151 env[1220]: time="2024-12-13T02:11:24.929969800Z" level=error msg="Failed to destroy network for sandbox \"1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:11:24.932630 env[1220]: time="2024-12-13T02:11:24.932535403Z" level=error msg="encountered an error cleaning up failed sandbox \"1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:11:24.932780 env[1220]: time="2024-12-13T02:11:24.932659543Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-q8jtg,Uid:ec6f24db-6064-4eab-a0e1-277f9824d7e5,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:11:24.933063 kubelet[2032]: E1213 02:11:24.932996 2032 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:11:24.933178 kubelet[2032]: E1213 02:11:24.933102 2032 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-q8jtg" Dec 13 02:11:24.933178 kubelet[2032]: E1213 02:11:24.933157 2032 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-q8jtg" Dec 13 02:11:24.934748 kubelet[2032]: E1213 02:11:24.933516 2032 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-q8jtg_kube-system(ec6f24db-6064-4eab-a0e1-277f9824d7e5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-q8jtg_kube-system(ec6f24db-6064-4eab-a0e1-277f9824d7e5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-q8jtg" podUID="ec6f24db-6064-4eab-a0e1-277f9824d7e5" Dec 13 02:11:25.253060 env[1220]: time="2024-12-13T02:11:25.252990395Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-4qxgx,Uid:38e5368d-879b-4625-afd4-c27aa522644e,Namespace:kube-system,Attempt:0,}" Dec 13 02:11:25.338099 env[1220]: time="2024-12-13T02:11:25.338013804Z" level=error msg="Failed to destroy network for sandbox \"db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:11:25.338694 env[1220]: time="2024-12-13T02:11:25.338525475Z" level=error msg="encountered an error cleaning up failed sandbox \"db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:11:25.338694 env[1220]: time="2024-12-13T02:11:25.338620341Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-4qxgx,Uid:38e5368d-879b-4625-afd4-c27aa522644e,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:11:25.338971 kubelet[2032]: E1213 02:11:25.338896 2032 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:11:25.339096 kubelet[2032]: E1213 02:11:25.338972 2032 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-4qxgx" Dec 13 02:11:25.339096 kubelet[2032]: E1213 02:11:25.339015 2032 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-4qxgx" Dec 13 02:11:25.339096 kubelet[2032]: E1213 02:11:25.339073 2032 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-4qxgx_kube-system(38e5368d-879b-4625-afd4-c27aa522644e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-4qxgx_kube-system(38e5368d-879b-4625-afd4-c27aa522644e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-4qxgx" podUID="38e5368d-879b-4625-afd4-c27aa522644e" Dec 13 02:11:25.356364 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95-shm.mount: Deactivated successfully. Dec 13 02:11:25.717057 kubelet[2032]: I1213 02:11:25.713062 2032 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4" Dec 13 02:11:25.718308 env[1220]: time="2024-12-13T02:11:25.718247497Z" level=info msg="StopPodSandbox for \"db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4\"" Dec 13 02:11:25.731651 kubelet[2032]: I1213 02:11:25.731612 2032 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95" Dec 13 02:11:25.734248 env[1220]: time="2024-12-13T02:11:25.734192173Z" level=info msg="StopPodSandbox for \"1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95\"" Dec 13 02:11:25.815322 env[1220]: time="2024-12-13T02:11:25.815234680Z" level=error msg="StopPodSandbox for \"1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95\" failed" error="failed to destroy network for sandbox \"1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:11:25.815618 kubelet[2032]: E1213 02:11:25.815552 2032 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95" Dec 13 02:11:25.815753 kubelet[2032]: E1213 02:11:25.815649 2032 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95"} Dec 13 02:11:25.815753 kubelet[2032]: E1213 02:11:25.815705 2032 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ec6f24db-6064-4eab-a0e1-277f9824d7e5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:11:25.815926 kubelet[2032]: E1213 02:11:25.815744 2032 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ec6f24db-6064-4eab-a0e1-277f9824d7e5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-q8jtg" podUID="ec6f24db-6064-4eab-a0e1-277f9824d7e5" Dec 13 02:11:25.831886 env[1220]: time="2024-12-13T02:11:25.831802194Z" level=error msg="StopPodSandbox for \"db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4\" failed" error="failed to destroy network for sandbox \"db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:11:25.832487 kubelet[2032]: E1213 02:11:25.832246 2032 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4" Dec 13 02:11:25.832487 kubelet[2032]: E1213 02:11:25.832324 2032 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4"} Dec 13 02:11:25.832487 kubelet[2032]: E1213 02:11:25.832376 2032 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"38e5368d-879b-4625-afd4-c27aa522644e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:11:25.832487 kubelet[2032]: E1213 02:11:25.832416 2032 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"38e5368d-879b-4625-afd4-c27aa522644e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-4qxgx" podUID="38e5368d-879b-4625-afd4-c27aa522644e" Dec 13 02:11:31.938540 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2626012974.mount: Deactivated successfully. Dec 13 02:11:31.981464 env[1220]: time="2024-12-13T02:11:31.981401233Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:11:31.984217 env[1220]: time="2024-12-13T02:11:31.984168272Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:11:31.986798 env[1220]: time="2024-12-13T02:11:31.986740572Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:11:31.989106 env[1220]: time="2024-12-13T02:11:31.989042637Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:11:31.990042 env[1220]: time="2024-12-13T02:11:31.989982988Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 02:11:32.018066 env[1220]: time="2024-12-13T02:11:32.017999200Z" level=info msg="CreateContainer within sandbox \"f3e6dda92d7ffa46ca75e93f3904b2dca781160ac02cd308b41501c50cbdd61e\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 02:11:32.041354 env[1220]: time="2024-12-13T02:11:32.041274732Z" level=info msg="CreateContainer within sandbox \"f3e6dda92d7ffa46ca75e93f3904b2dca781160ac02cd308b41501c50cbdd61e\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"57d503df536c00d49fcd26d2d9f0d3c259ab11bcc5b0ac34badd5f03d9a3785f\"" Dec 13 02:11:32.044022 env[1220]: time="2024-12-13T02:11:32.043098753Z" level=info msg="StartContainer for \"57d503df536c00d49fcd26d2d9f0d3c259ab11bcc5b0ac34badd5f03d9a3785f\"" Dec 13 02:11:32.075785 systemd[1]: Started cri-containerd-57d503df536c00d49fcd26d2d9f0d3c259ab11bcc5b0ac34badd5f03d9a3785f.scope. Dec 13 02:11:32.115613 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 02:11:32.115810 kernel: audit: type=1400 audit(1734055892.109:905): avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:32.109000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:32.109000 audit[3079]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f6e183eb958 items=0 ppid=2482 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:32.169766 kernel: audit: type=1300 audit(1734055892.109:905): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f6e183eb958 items=0 ppid=2482 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:32.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537643530336466353336633030643439666364323664326439663064 Dec 13 02:11:32.199594 kernel: audit: type=1327 audit(1734055892.109:905): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537643530336466353336633030643439666364323664326439663064 Dec 13 02:11:32.115000 audit[3079]: AVC avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:32.221895 kernel: audit: type=1400 audit(1734055892.115:906): avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:32.115000 audit[3079]: AVC avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:32.242719 kernel: audit: type=1400 audit(1734055892.115:906): avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:32.115000 audit[3079]: AVC avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:32.266700 kernel: audit: type=1400 audit(1734055892.115:906): avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:32.115000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:32.115000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:32.303585 env[1220]: time="2024-12-13T02:11:32.303500153Z" level=info msg="StartContainer for \"57d503df536c00d49fcd26d2d9f0d3c259ab11bcc5b0ac34badd5f03d9a3785f\" returns successfully" Dec 13 02:11:32.310375 kernel: audit: type=1400 audit(1734055892.115:906): avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:32.310543 kernel: audit: type=1400 audit(1734055892.115:906): avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:32.115000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:32.115000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:32.332678 kernel: audit: type=1400 audit(1734055892.115:906): avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:32.332769 kernel: audit: type=1400 audit(1734055892.115:906): avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:32.115000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:32.115000 audit[3079]: AVC avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:32.115000 audit[3079]: AVC avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:32.115000 audit: BPF prog-id=145 op=LOAD Dec 13 02:11:32.115000 audit[3079]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c0002826b8 items=0 ppid=2482 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:32.115000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537643530336466353336633030643439666364323664326439663064 Dec 13 02:11:32.136000 audit[3079]: AVC avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:32.136000 audit[3079]: AVC avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:32.136000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:32.136000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:32.136000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:32.136000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:32.136000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:32.136000 audit[3079]: AVC avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:32.136000 audit[3079]: AVC avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:32.136000 audit: BPF prog-id=146 op=LOAD Dec 13 02:11:32.136000 audit[3079]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c000282708 items=0 ppid=2482 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:32.136000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537643530336466353336633030643439666364323664326439663064 Dec 13 02:11:32.168000 audit: BPF prog-id=146 op=UNLOAD Dec 13 02:11:32.169000 audit: BPF prog-id=145 op=UNLOAD Dec 13 02:11:32.169000 audit[3079]: AVC avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:32.169000 audit[3079]: AVC avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:32.169000 audit[3079]: AVC avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:32.169000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:32.169000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:32.169000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:32.169000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:32.169000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:32.169000 audit[3079]: AVC avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:32.169000 audit[3079]: AVC avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:32.169000 audit: BPF prog-id=147 op=LOAD Dec 13 02:11:32.169000 audit[3079]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c000282798 items=0 ppid=2482 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:32.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537643530336466353336633030643439666364323664326439663064 Dec 13 02:11:32.438784 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 02:11:32.438987 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 02:11:32.776997 kubelet[2032]: I1213 02:11:32.776922 2032 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-z8vb9" podStartSLOduration=1.9072712950000001 podStartE2EDuration="20.776894749s" podCreationTimestamp="2024-12-13 02:11:12 +0000 UTC" firstStartedPulling="2024-12-13 02:11:13.122126254 +0000 UTC m=+19.720596651" lastFinishedPulling="2024-12-13 02:11:31.991749724 +0000 UTC m=+38.590220105" observedRunningTime="2024-12-13 02:11:32.775640607 +0000 UTC m=+39.374110991" watchObservedRunningTime="2024-12-13 02:11:32.776894749 +0000 UTC m=+39.375365156" Dec 13 02:11:33.821000 audit[3177]: AVC avc: denied { write } for pid=3177 comm="tee" name="fd" dev="proc" ino=24093 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:11:33.821000 audit[3177]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd722539c4 a2=241 a3=1b6 items=1 ppid=3151 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:33.821000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 02:11:33.821000 audit: PATH item=0 name="/dev/fd/63" inode=24090 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:11:33.821000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:11:33.862000 audit[3200]: AVC avc: denied { write } for pid=3200 comm="tee" name="fd" dev="proc" ino=24105 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:11:33.862000 audit[3200]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffebf28d9b5 a2=241 a3=1b6 items=1 ppid=3157 pid=3200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:33.862000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 02:11:33.862000 audit: PATH item=0 name="/dev/fd/63" inode=24583 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:11:33.862000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:11:33.870000 audit[3196]: AVC avc: denied { write } for pid=3196 comm="tee" name="fd" dev="proc" ino=24590 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:11:33.870000 audit[3196]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd155e79c4 a2=241 a3=1b6 items=1 ppid=3149 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:33.870000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 02:11:33.870000 audit: PATH item=0 name="/dev/fd/63" inode=24582 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:11:33.870000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:11:33.881000 audit[3207]: AVC avc: denied { write } for pid=3207 comm="tee" name="fd" dev="proc" ino=24596 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:11:33.881000 audit[3207]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff765fd9c4 a2=241 a3=1b6 items=1 ppid=3159 pid=3207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:33.881000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 02:11:33.881000 audit: PATH item=0 name="/dev/fd/63" inode=24587 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:11:33.881000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:11:33.886000 audit[3205]: AVC avc: denied { write } for pid=3205 comm="tee" name="fd" dev="proc" ino=24600 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:11:33.886000 audit[3205]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffedc3219c6 a2=241 a3=1b6 items=1 ppid=3147 pid=3205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:33.886000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 02:11:33.886000 audit: PATH item=0 name="/dev/fd/63" inode=24586 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:11:33.886000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:11:33.907000 audit[3223]: AVC avc: denied { write } for pid=3223 comm="tee" name="fd" dev="proc" ino=24607 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:11:33.907000 audit[3223]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe5af6e9b4 a2=241 a3=1b6 items=1 ppid=3153 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:33.907000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 02:11:33.907000 audit: PATH item=0 name="/dev/fd/63" inode=24603 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:11:33.907000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:11:33.916000 audit[3221]: AVC avc: denied { write } for pid=3221 comm="tee" name="fd" dev="proc" ino=24611 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:11:33.916000 audit[3221]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcaf32e9c5 a2=241 a3=1b6 items=1 ppid=3155 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:33.916000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 02:11:33.916000 audit: PATH item=0 name="/dev/fd/63" inode=24602 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:11:33.916000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:11:34.193000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.193000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.193000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.193000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.193000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.193000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.193000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.193000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.193000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.193000 audit: BPF prog-id=148 op=LOAD Dec 13 02:11:34.193000 audit[3254]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdacee97d0 a2=98 a3=3 items=0 ppid=3152 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.193000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:11:34.196000 audit: BPF prog-id=148 op=UNLOAD Dec 13 02:11:34.197000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.197000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.197000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.197000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.197000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.197000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.197000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.197000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.197000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.197000 audit: BPF prog-id=149 op=LOAD Dec 13 02:11:34.197000 audit[3254]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdacee95b0 a2=74 a3=540051 items=0 ppid=3152 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.197000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:11:34.197000 audit: BPF prog-id=149 op=UNLOAD Dec 13 02:11:34.197000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.197000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.197000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.197000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.197000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.197000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.197000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.197000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.197000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.197000 audit: BPF prog-id=150 op=LOAD Dec 13 02:11:34.197000 audit[3254]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdacee95e0 a2=94 a3=2 items=0 ppid=3152 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.197000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:11:34.197000 audit: BPF prog-id=150 op=UNLOAD Dec 13 02:11:34.350000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.350000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.350000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.350000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.350000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.350000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.350000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.350000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.350000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.350000 audit: BPF prog-id=151 op=LOAD Dec 13 02:11:34.350000 audit[3254]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdacee94a0 a2=40 a3=1 items=0 ppid=3152 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.350000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:11:34.350000 audit: BPF prog-id=151 op=UNLOAD Dec 13 02:11:34.350000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.350000 audit[3254]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdacee9570 a2=50 a3=7ffdacee9650 items=0 ppid=3152 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.350000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:11:34.362000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.362000 audit[3254]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdacee94b0 a2=28 a3=0 items=0 ppid=3152 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.362000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:11:34.362000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.362000 audit[3254]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdacee94e0 a2=28 a3=0 items=0 ppid=3152 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.362000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:11:34.362000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.362000 audit[3254]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdacee93f0 a2=28 a3=0 items=0 ppid=3152 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.362000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:11:34.362000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.362000 audit[3254]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdacee9500 a2=28 a3=0 items=0 ppid=3152 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.362000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:11:34.362000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.362000 audit[3254]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdacee94e0 a2=28 a3=0 items=0 ppid=3152 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.362000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:11:34.362000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.362000 audit[3254]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdacee94d0 a2=28 a3=0 items=0 ppid=3152 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.362000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:11:34.362000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.362000 audit[3254]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdacee9500 a2=28 a3=0 items=0 ppid=3152 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.362000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:11:34.362000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.362000 audit[3254]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdacee94e0 a2=28 a3=0 items=0 ppid=3152 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.362000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:11:34.362000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.362000 audit[3254]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdacee9500 a2=28 a3=0 items=0 ppid=3152 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.362000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:11:34.362000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.362000 audit[3254]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdacee94d0 a2=28 a3=0 items=0 ppid=3152 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.362000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:11:34.362000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.362000 audit[3254]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdacee9540 a2=28 a3=0 items=0 ppid=3152 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.362000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:11:34.362000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.362000 audit[3254]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdacee92f0 a2=50 a3=1 items=0 ppid=3152 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.362000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:11:34.362000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.362000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.362000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.362000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.362000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.362000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.362000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.362000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.362000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.362000 audit: BPF prog-id=152 op=LOAD Dec 13 02:11:34.362000 audit[3254]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdacee92f0 a2=94 a3=5 items=0 ppid=3152 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.362000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:11:34.362000 audit: BPF prog-id=152 op=UNLOAD Dec 13 02:11:34.362000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.362000 audit[3254]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdacee93a0 a2=50 a3=1 items=0 ppid=3152 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.362000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:11:34.362000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.362000 audit[3254]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffdacee94c0 a2=4 a3=38 items=0 ppid=3152 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.362000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:11:34.362000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.362000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.362000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.362000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.362000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.362000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.362000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.362000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.362000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.362000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.362000 audit[3254]: AVC avc: denied { confidentiality } for pid=3254 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:11:34.362000 audit[3254]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdacee9510 a2=94 a3=6 items=0 ppid=3152 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.362000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:11:34.363000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.363000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.363000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.363000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.363000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.363000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.363000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.363000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.363000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.363000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.363000 audit[3254]: AVC avc: denied { confidentiality } for pid=3254 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:11:34.363000 audit[3254]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdacee8cc0 a2=94 a3=83 items=0 ppid=3152 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.363000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:11:34.363000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.363000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.363000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.363000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.363000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.363000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.363000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.363000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.363000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.363000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.363000 audit[3254]: AVC avc: denied { confidentiality } for pid=3254 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:11:34.363000 audit[3254]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdacee8cc0 a2=94 a3=83 items=0 ppid=3152 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.363000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:11:34.376000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.376000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.376000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.376000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.376000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.376000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.376000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.376000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.376000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.376000 audit: BPF prog-id=153 op=LOAD Dec 13 02:11:34.376000 audit[3257]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc98318330 a2=98 a3=1999999999999999 items=0 ppid=3152 pid=3257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.376000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:11:34.376000 audit: BPF prog-id=153 op=UNLOAD Dec 13 02:11:34.376000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.376000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.376000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.376000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.376000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.376000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.376000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.376000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.376000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.376000 audit: BPF prog-id=154 op=LOAD Dec 13 02:11:34.376000 audit[3257]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc98318210 a2=74 a3=ffff items=0 ppid=3152 pid=3257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.376000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:11:34.376000 audit: BPF prog-id=154 op=UNLOAD Dec 13 02:11:34.376000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.376000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.376000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.376000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.376000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.376000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.376000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.376000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.376000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.376000 audit: BPF prog-id=155 op=LOAD Dec 13 02:11:34.376000 audit[3257]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc98318250 a2=40 a3=7ffc98318430 items=0 ppid=3152 pid=3257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.376000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:11:34.377000 audit: BPF prog-id=155 op=UNLOAD Dec 13 02:11:34.488426 systemd-networkd[1019]: vxlan.calico: Link UP Dec 13 02:11:34.488438 systemd-networkd[1019]: vxlan.calico: Gained carrier Dec 13 02:11:34.522000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.522000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.522000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.522000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.522000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.522000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.522000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.522000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.522000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.522000 audit: BPF prog-id=156 op=LOAD Dec 13 02:11:34.522000 audit[3285]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc4ad6de80 a2=98 a3=ffffffff items=0 ppid=3152 pid=3285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.522000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:11:34.524000 audit: BPF prog-id=156 op=UNLOAD Dec 13 02:11:34.524000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.524000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.524000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.524000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.524000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.524000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.524000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.524000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.524000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.524000 audit: BPF prog-id=157 op=LOAD Dec 13 02:11:34.524000 audit[3285]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc4ad6dc90 a2=74 a3=540051 items=0 ppid=3152 pid=3285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.524000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:11:34.524000 audit: BPF prog-id=157 op=UNLOAD Dec 13 02:11:34.524000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.524000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.524000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.524000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.524000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.524000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.524000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.524000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.524000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.524000 audit: BPF prog-id=158 op=LOAD Dec 13 02:11:34.524000 audit[3285]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc4ad6dcc0 a2=94 a3=2 items=0 ppid=3152 pid=3285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.524000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:11:34.524000 audit: BPF prog-id=158 op=UNLOAD Dec 13 02:11:34.524000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.524000 audit[3285]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc4ad6db90 a2=28 a3=0 items=0 ppid=3152 pid=3285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.524000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:11:34.524000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.524000 audit[3285]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc4ad6dbc0 a2=28 a3=0 items=0 ppid=3152 pid=3285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.524000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:11:34.524000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.524000 audit[3285]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc4ad6dad0 a2=28 a3=0 items=0 ppid=3152 pid=3285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.524000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:11:34.524000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.524000 audit[3285]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc4ad6dbe0 a2=28 a3=0 items=0 ppid=3152 pid=3285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.524000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:11:34.524000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.524000 audit[3285]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc4ad6dbc0 a2=28 a3=0 items=0 ppid=3152 pid=3285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.524000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:11:34.524000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.524000 audit[3285]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc4ad6dbb0 a2=28 a3=0 items=0 ppid=3152 pid=3285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.524000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:11:34.524000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.524000 audit[3285]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc4ad6dbe0 a2=28 a3=0 items=0 ppid=3152 pid=3285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.524000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:11:34.524000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.524000 audit[3285]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc4ad6dbc0 a2=28 a3=0 items=0 ppid=3152 pid=3285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.524000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:11:34.524000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.524000 audit[3285]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc4ad6dbe0 a2=28 a3=0 items=0 ppid=3152 pid=3285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.524000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:11:34.524000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.524000 audit[3285]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc4ad6dbb0 a2=28 a3=0 items=0 ppid=3152 pid=3285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.524000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:11:34.525000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.525000 audit[3285]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc4ad6dc20 a2=28 a3=0 items=0 ppid=3152 pid=3285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.525000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:11:34.527000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.527000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.527000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.527000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.527000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.527000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.527000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.527000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.527000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.527000 audit: BPF prog-id=159 op=LOAD Dec 13 02:11:34.527000 audit[3285]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc4ad6da90 a2=40 a3=0 items=0 ppid=3152 pid=3285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.527000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:11:34.527000 audit: BPF prog-id=159 op=UNLOAD Dec 13 02:11:34.528000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.528000 audit[3285]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffc4ad6da80 a2=50 a3=2800 items=0 ppid=3152 pid=3285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.528000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:11:34.528000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.528000 audit[3285]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffc4ad6da80 a2=50 a3=2800 items=0 ppid=3152 pid=3285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.528000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:11:34.529000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.529000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.529000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.529000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.529000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.529000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.529000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.529000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.529000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.529000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.529000 audit: BPF prog-id=160 op=LOAD Dec 13 02:11:34.529000 audit[3285]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc4ad6d2a0 a2=94 a3=2 items=0 ppid=3152 pid=3285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.529000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:11:34.529000 audit: BPF prog-id=160 op=UNLOAD Dec 13 02:11:34.529000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.529000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.529000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.529000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.529000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.529000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.529000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.529000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.529000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.529000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.529000 audit: BPF prog-id=161 op=LOAD Dec 13 02:11:34.529000 audit[3285]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc4ad6d3a0 a2=94 a3=2d items=0 ppid=3152 pid=3285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.529000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:11:34.537000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.537000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.537000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.537000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.537000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.537000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.537000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.537000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.537000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.537000 audit: BPF prog-id=162 op=LOAD Dec 13 02:11:34.537000 audit[3288]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd40bfbd80 a2=98 a3=0 items=0 ppid=3152 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.537000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:11:34.537000 audit: BPF prog-id=162 op=UNLOAD Dec 13 02:11:34.538000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.538000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.538000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.538000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.538000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.538000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.538000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.538000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.538000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.538000 audit: BPF prog-id=163 op=LOAD Dec 13 02:11:34.538000 audit[3288]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd40bfbb60 a2=74 a3=540051 items=0 ppid=3152 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.538000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:11:34.538000 audit: BPF prog-id=163 op=UNLOAD Dec 13 02:11:34.538000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.538000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.538000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.538000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.538000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.538000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.538000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.538000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.538000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.538000 audit: BPF prog-id=164 op=LOAD Dec 13 02:11:34.538000 audit[3288]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd40bfbb90 a2=94 a3=2 items=0 ppid=3152 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.538000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:11:34.538000 audit: BPF prog-id=164 op=UNLOAD Dec 13 02:11:34.686000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.686000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.686000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.686000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.686000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.686000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.686000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.686000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.686000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.686000 audit: BPF prog-id=165 op=LOAD Dec 13 02:11:34.686000 audit[3288]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd40bfba50 a2=40 a3=1 items=0 ppid=3152 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.686000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:11:34.687000 audit: BPF prog-id=165 op=UNLOAD Dec 13 02:11:34.687000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.687000 audit[3288]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd40bfbb20 a2=50 a3=7ffd40bfbc00 items=0 ppid=3152 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.687000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:11:34.700000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.700000 audit[3288]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd40bfba60 a2=28 a3=0 items=0 ppid=3152 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.700000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:11:34.700000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.700000 audit[3288]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd40bfba90 a2=28 a3=0 items=0 ppid=3152 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.700000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:11:34.700000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.700000 audit[3288]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd40bfb9a0 a2=28 a3=0 items=0 ppid=3152 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.700000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:11:34.700000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.700000 audit[3288]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd40bfbab0 a2=28 a3=0 items=0 ppid=3152 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.700000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:11:34.700000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.700000 audit[3288]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd40bfba90 a2=28 a3=0 items=0 ppid=3152 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.700000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:11:34.700000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.700000 audit[3288]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd40bfba80 a2=28 a3=0 items=0 ppid=3152 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.700000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:11:34.700000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.700000 audit[3288]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd40bfbab0 a2=28 a3=0 items=0 ppid=3152 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.700000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:11:34.700000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.700000 audit[3288]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd40bfba90 a2=28 a3=0 items=0 ppid=3152 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.700000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:11:34.700000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.700000 audit[3288]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd40bfbab0 a2=28 a3=0 items=0 ppid=3152 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.700000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:11:34.700000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.700000 audit[3288]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd40bfba80 a2=28 a3=0 items=0 ppid=3152 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.700000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:11:34.700000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.700000 audit[3288]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd40bfbaf0 a2=28 a3=0 items=0 ppid=3152 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.700000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:11:34.700000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.700000 audit[3288]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd40bfb8a0 a2=50 a3=1 items=0 ppid=3152 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.700000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:11:34.700000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.700000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.700000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.700000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.700000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.700000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.700000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.700000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.700000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.700000 audit: BPF prog-id=166 op=LOAD Dec 13 02:11:34.700000 audit[3288]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd40bfb8a0 a2=94 a3=5 items=0 ppid=3152 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.700000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:11:34.700000 audit: BPF prog-id=166 op=UNLOAD Dec 13 02:11:34.700000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.700000 audit[3288]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd40bfb950 a2=50 a3=1 items=0 ppid=3152 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.700000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:11:34.700000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.700000 audit[3288]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd40bfba70 a2=4 a3=38 items=0 ppid=3152 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.700000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:11:34.700000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.700000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.700000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.700000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.700000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.700000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.700000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.700000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.700000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.700000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.700000 audit[3288]: AVC avc: denied { confidentiality } for pid=3288 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:11:34.700000 audit[3288]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd40bfbac0 a2=94 a3=6 items=0 ppid=3152 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.700000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:11:34.701000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.701000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.701000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.701000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.701000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.701000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.701000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.701000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.701000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.701000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.701000 audit[3288]: AVC avc: denied { confidentiality } for pid=3288 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:11:34.701000 audit[3288]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd40bfb270 a2=94 a3=83 items=0 ppid=3152 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.701000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:11:34.701000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.701000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.701000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.701000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.701000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.701000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.701000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.701000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.701000 audit[3288]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd40bfb270 a2=94 a3=83 items=0 ppid=3152 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.701000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:11:34.702000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.702000 audit[3288]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd40bfccb0 a2=10 a3=f1f00800 items=0 ppid=3152 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.702000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:11:34.702000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.702000 audit[3288]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd40bfcb50 a2=10 a3=3 items=0 ppid=3152 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.702000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:11:34.702000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.702000 audit[3288]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd40bfcaf0 a2=10 a3=3 items=0 ppid=3152 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.702000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:11:34.702000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:34.702000 audit[3288]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd40bfcaf0 a2=10 a3=7 items=0 ppid=3152 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.702000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:11:34.710000 audit: BPF prog-id=161 op=UNLOAD Dec 13 02:11:34.797000 audit[3317]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3317 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:11:34.797000 audit[3317]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffe600bc990 a2=0 a3=7ffe600bc97c items=0 ppid=3152 pid=3317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.797000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:11:34.822000 audit[3314]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=3314 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:11:34.822000 audit[3314]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffc3da0bb30 a2=0 a3=7ffc3da0bb1c items=0 ppid=3152 pid=3314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.823000 audit[3315]: NETFILTER_CFG table=filter:99 family=2 entries=39 op=nft_register_chain pid=3315 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:11:34.823000 audit[3315]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7fff728aeba0 a2=0 a3=7fff728aeb8c items=0 ppid=3152 pid=3315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.823000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:11:34.822000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:11:34.824000 audit[3313]: NETFILTER_CFG table=raw:100 family=2 entries=21 op=nft_register_chain pid=3313 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:11:34.824000 audit[3313]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffc8842c3e0 a2=0 a3=7ffc8842c3cc items=0 ppid=3152 pid=3313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:34.824000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:11:36.158363 systemd-networkd[1019]: vxlan.calico: Gained IPv6LL Dec 13 02:11:36.550252 env[1220]: time="2024-12-13T02:11:36.549870831Z" level=info msg="StopPodSandbox for \"1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95\"" Dec 13 02:11:36.668252 env[1220]: 2024-12-13 02:11:36.615 [INFO][3342] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95" Dec 13 02:11:36.668252 env[1220]: 2024-12-13 02:11:36.615 [INFO][3342] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95" iface="eth0" netns="/var/run/netns/cni-f1a94dae-98a8-0907-c670-0e6ecfd027af" Dec 13 02:11:36.668252 env[1220]: 2024-12-13 02:11:36.616 [INFO][3342] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95" iface="eth0" netns="/var/run/netns/cni-f1a94dae-98a8-0907-c670-0e6ecfd027af" Dec 13 02:11:36.668252 env[1220]: 2024-12-13 02:11:36.616 [INFO][3342] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95" iface="eth0" netns="/var/run/netns/cni-f1a94dae-98a8-0907-c670-0e6ecfd027af" Dec 13 02:11:36.668252 env[1220]: 2024-12-13 02:11:36.617 [INFO][3342] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95" Dec 13 02:11:36.668252 env[1220]: 2024-12-13 02:11:36.617 [INFO][3342] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95" Dec 13 02:11:36.668252 env[1220]: 2024-12-13 02:11:36.648 [INFO][3348] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95" HandleID="k8s-pod-network.1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--q8jtg-eth0" Dec 13 02:11:36.668252 env[1220]: 2024-12-13 02:11:36.648 [INFO][3348] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:11:36.668252 env[1220]: 2024-12-13 02:11:36.648 [INFO][3348] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:11:36.668252 env[1220]: 2024-12-13 02:11:36.656 [WARNING][3348] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95" HandleID="k8s-pod-network.1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--q8jtg-eth0" Dec 13 02:11:36.668252 env[1220]: 2024-12-13 02:11:36.657 [INFO][3348] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95" HandleID="k8s-pod-network.1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--q8jtg-eth0" Dec 13 02:11:36.668252 env[1220]: 2024-12-13 02:11:36.659 [INFO][3348] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:11:36.668252 env[1220]: 2024-12-13 02:11:36.662 [INFO][3342] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95" Dec 13 02:11:36.668116 systemd[1]: run-netns-cni\x2df1a94dae\x2d98a8\x2d0907\x2dc670\x2d0e6ecfd027af.mount: Deactivated successfully. Dec 13 02:11:36.671350 env[1220]: time="2024-12-13T02:11:36.669656090Z" level=info msg="TearDown network for sandbox \"1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95\" successfully" Dec 13 02:11:36.671350 env[1220]: time="2024-12-13T02:11:36.669739544Z" level=info msg="StopPodSandbox for \"1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95\" returns successfully" Dec 13 02:11:36.672412 env[1220]: time="2024-12-13T02:11:36.672360581Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-q8jtg,Uid:ec6f24db-6064-4eab-a0e1-277f9824d7e5,Namespace:kube-system,Attempt:1,}" Dec 13 02:11:36.842960 systemd-networkd[1019]: cali0ae47e793ae: Link UP Dec 13 02:11:36.849632 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:11:36.849738 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0ae47e793ae: link becomes ready Dec 13 02:11:36.851335 systemd-networkd[1019]: cali0ae47e793ae: Gained carrier Dec 13 02:11:36.877104 env[1220]: 2024-12-13 02:11:36.742 [INFO][3354] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--q8jtg-eth0 coredns-6f6b679f8f- kube-system ec6f24db-6064-4eab-a0e1-277f9824d7e5 809 0 2024-12-13 02:11:01 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal coredns-6f6b679f8f-q8jtg eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali0ae47e793ae [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="66ede33efc9295b6ea1c2c1c23814eb71dbea440ecd3ec5fab4a818d44bba818" Namespace="kube-system" Pod="coredns-6f6b679f8f-q8jtg" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--q8jtg-" Dec 13 02:11:36.877104 env[1220]: 2024-12-13 02:11:36.742 [INFO][3354] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="66ede33efc9295b6ea1c2c1c23814eb71dbea440ecd3ec5fab4a818d44bba818" Namespace="kube-system" Pod="coredns-6f6b679f8f-q8jtg" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--q8jtg-eth0" Dec 13 02:11:36.877104 env[1220]: 2024-12-13 02:11:36.781 [INFO][3365] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="66ede33efc9295b6ea1c2c1c23814eb71dbea440ecd3ec5fab4a818d44bba818" HandleID="k8s-pod-network.66ede33efc9295b6ea1c2c1c23814eb71dbea440ecd3ec5fab4a818d44bba818" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--q8jtg-eth0" Dec 13 02:11:36.877104 env[1220]: 2024-12-13 02:11:36.795 [INFO][3365] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="66ede33efc9295b6ea1c2c1c23814eb71dbea440ecd3ec5fab4a818d44bba818" HandleID="k8s-pod-network.66ede33efc9295b6ea1c2c1c23814eb71dbea440ecd3ec5fab4a818d44bba818" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--q8jtg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031af50), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal", "pod":"coredns-6f6b679f8f-q8jtg", "timestamp":"2024-12-13 02:11:36.781213327 +0000 UTC"}, Hostname:"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:11:36.877104 env[1220]: 2024-12-13 02:11:36.795 [INFO][3365] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:11:36.877104 env[1220]: 2024-12-13 02:11:36.795 [INFO][3365] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:11:36.877104 env[1220]: 2024-12-13 02:11:36.795 [INFO][3365] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal' Dec 13 02:11:36.877104 env[1220]: 2024-12-13 02:11:36.798 [INFO][3365] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.66ede33efc9295b6ea1c2c1c23814eb71dbea440ecd3ec5fab4a818d44bba818" host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:36.877104 env[1220]: 2024-12-13 02:11:36.802 [INFO][3365] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:36.877104 env[1220]: 2024-12-13 02:11:36.808 [INFO][3365] ipam/ipam.go 489: Trying affinity for 192.168.99.0/26 host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:36.877104 env[1220]: 2024-12-13 02:11:36.811 [INFO][3365] ipam/ipam.go 155: Attempting to load block cidr=192.168.99.0/26 host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:36.877104 env[1220]: 2024-12-13 02:11:36.813 [INFO][3365] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.99.0/26 host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:36.877104 env[1220]: 2024-12-13 02:11:36.813 [INFO][3365] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.99.0/26 handle="k8s-pod-network.66ede33efc9295b6ea1c2c1c23814eb71dbea440ecd3ec5fab4a818d44bba818" host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:36.877104 env[1220]: 2024-12-13 02:11:36.815 [INFO][3365] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.66ede33efc9295b6ea1c2c1c23814eb71dbea440ecd3ec5fab4a818d44bba818 Dec 13 02:11:36.877104 env[1220]: 2024-12-13 02:11:36.822 [INFO][3365] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.99.0/26 handle="k8s-pod-network.66ede33efc9295b6ea1c2c1c23814eb71dbea440ecd3ec5fab4a818d44bba818" host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:36.877104 env[1220]: 2024-12-13 02:11:36.831 [INFO][3365] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.99.1/26] block=192.168.99.0/26 handle="k8s-pod-network.66ede33efc9295b6ea1c2c1c23814eb71dbea440ecd3ec5fab4a818d44bba818" host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:36.877104 env[1220]: 2024-12-13 02:11:36.831 [INFO][3365] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.99.1/26] handle="k8s-pod-network.66ede33efc9295b6ea1c2c1c23814eb71dbea440ecd3ec5fab4a818d44bba818" host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:36.877104 env[1220]: 2024-12-13 02:11:36.831 [INFO][3365] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:11:36.877104 env[1220]: 2024-12-13 02:11:36.831 [INFO][3365] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.99.1/26] IPv6=[] ContainerID="66ede33efc9295b6ea1c2c1c23814eb71dbea440ecd3ec5fab4a818d44bba818" HandleID="k8s-pod-network.66ede33efc9295b6ea1c2c1c23814eb71dbea440ecd3ec5fab4a818d44bba818" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--q8jtg-eth0" Dec 13 02:11:36.878480 env[1220]: 2024-12-13 02:11:36.833 [INFO][3354] cni-plugin/k8s.go 386: Populated endpoint ContainerID="66ede33efc9295b6ea1c2c1c23814eb71dbea440ecd3ec5fab4a818d44bba818" Namespace="kube-system" Pod="coredns-6f6b679f8f-q8jtg" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--q8jtg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--q8jtg-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"ec6f24db-6064-4eab-a0e1-277f9824d7e5", ResourceVersion:"809", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 11, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal", ContainerID:"", Pod:"coredns-6f6b679f8f-q8jtg", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.99.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0ae47e793ae", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:11:36.878480 env[1220]: 2024-12-13 02:11:36.833 [INFO][3354] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.99.1/32] ContainerID="66ede33efc9295b6ea1c2c1c23814eb71dbea440ecd3ec5fab4a818d44bba818" Namespace="kube-system" Pod="coredns-6f6b679f8f-q8jtg" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--q8jtg-eth0" Dec 13 02:11:36.878480 env[1220]: 2024-12-13 02:11:36.833 [INFO][3354] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali0ae47e793ae ContainerID="66ede33efc9295b6ea1c2c1c23814eb71dbea440ecd3ec5fab4a818d44bba818" Namespace="kube-system" Pod="coredns-6f6b679f8f-q8jtg" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--q8jtg-eth0" Dec 13 02:11:36.878480 env[1220]: 2024-12-13 02:11:36.851 [INFO][3354] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="66ede33efc9295b6ea1c2c1c23814eb71dbea440ecd3ec5fab4a818d44bba818" Namespace="kube-system" Pod="coredns-6f6b679f8f-q8jtg" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--q8jtg-eth0" Dec 13 02:11:36.878480 env[1220]: 2024-12-13 02:11:36.852 [INFO][3354] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="66ede33efc9295b6ea1c2c1c23814eb71dbea440ecd3ec5fab4a818d44bba818" Namespace="kube-system" Pod="coredns-6f6b679f8f-q8jtg" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--q8jtg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--q8jtg-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"ec6f24db-6064-4eab-a0e1-277f9824d7e5", ResourceVersion:"809", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 11, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal", ContainerID:"66ede33efc9295b6ea1c2c1c23814eb71dbea440ecd3ec5fab4a818d44bba818", Pod:"coredns-6f6b679f8f-q8jtg", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.99.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0ae47e793ae", MAC:"0e:47:83:98:33:4c", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:11:36.878480 env[1220]: 2024-12-13 02:11:36.874 [INFO][3354] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="66ede33efc9295b6ea1c2c1c23814eb71dbea440ecd3ec5fab4a818d44bba818" Namespace="kube-system" Pod="coredns-6f6b679f8f-q8jtg" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--q8jtg-eth0" Dec 13 02:11:36.895000 audit[3385]: NETFILTER_CFG table=filter:101 family=2 entries=34 op=nft_register_chain pid=3385 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:11:36.895000 audit[3385]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7fff0755ab30 a2=0 a3=7fff0755ab1c items=0 ppid=3152 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:36.895000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:11:36.902468 env[1220]: time="2024-12-13T02:11:36.902034531Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:11:36.902468 env[1220]: time="2024-12-13T02:11:36.902177208Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:11:36.902468 env[1220]: time="2024-12-13T02:11:36.902201782Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:11:36.902808 env[1220]: time="2024-12-13T02:11:36.902499147Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/66ede33efc9295b6ea1c2c1c23814eb71dbea440ecd3ec5fab4a818d44bba818 pid=3395 runtime=io.containerd.runc.v2 Dec 13 02:11:36.941351 systemd[1]: run-containerd-runc-k8s.io-66ede33efc9295b6ea1c2c1c23814eb71dbea440ecd3ec5fab4a818d44bba818-runc.sxaqiC.mount: Deactivated successfully. Dec 13 02:11:36.950017 systemd[1]: Started cri-containerd-66ede33efc9295b6ea1c2c1c23814eb71dbea440ecd3ec5fab4a818d44bba818.scope. Dec 13 02:11:36.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:36.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:36.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:36.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:36.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:36.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:36.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:36.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:36.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:36.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:36.967000 audit: BPF prog-id=167 op=LOAD Dec 13 02:11:36.968000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:36.968000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3395 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:36.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636656465333365666339323935623665613163326331633233383134 Dec 13 02:11:36.968000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:36.968000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3395 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:36.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636656465333365666339323935623665613163326331633233383134 Dec 13 02:11:36.968000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:36.968000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:36.968000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:36.968000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:36.968000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:36.968000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:36.968000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:36.968000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:36.968000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:36.968000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:36.968000 audit: BPF prog-id=168 op=LOAD Dec 13 02:11:36.968000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003fcca0 items=0 ppid=3395 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:36.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636656465333365666339323935623665613163326331633233383134 Dec 13 02:11:36.968000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:36.968000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:36.968000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:36.968000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:36.968000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:36.968000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:36.968000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:36.968000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:36.968000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:36.968000 audit: BPF prog-id=169 op=LOAD Dec 13 02:11:36.968000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003fcce8 items=0 ppid=3395 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:36.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636656465333365666339323935623665613163326331633233383134 Dec 13 02:11:36.968000 audit: BPF prog-id=169 op=UNLOAD Dec 13 02:11:36.969000 audit: BPF prog-id=168 op=UNLOAD Dec 13 02:11:36.969000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:36.969000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:36.969000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:36.969000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:36.969000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:36.969000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:36.969000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:36.969000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:36.969000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:36.969000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:36.969000 audit: BPF prog-id=170 op=LOAD Dec 13 02:11:36.969000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003fd0f8 items=0 ppid=3395 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:36.969000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636656465333365666339323935623665613163326331633233383134 Dec 13 02:11:37.009065 env[1220]: time="2024-12-13T02:11:37.009014029Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-q8jtg,Uid:ec6f24db-6064-4eab-a0e1-277f9824d7e5,Namespace:kube-system,Attempt:1,} returns sandbox id \"66ede33efc9295b6ea1c2c1c23814eb71dbea440ecd3ec5fab4a818d44bba818\"" Dec 13 02:11:37.012676 env[1220]: time="2024-12-13T02:11:37.012630051Z" level=info msg="CreateContainer within sandbox \"66ede33efc9295b6ea1c2c1c23814eb71dbea440ecd3ec5fab4a818d44bba818\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 02:11:37.030972 env[1220]: time="2024-12-13T02:11:37.030901034Z" level=info msg="CreateContainer within sandbox \"66ede33efc9295b6ea1c2c1c23814eb71dbea440ecd3ec5fab4a818d44bba818\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"a1d7747d9e6d1d8217aa2c95cfbd75999a99054d6088eca871260306e4ede505\"" Dec 13 02:11:37.034340 env[1220]: time="2024-12-13T02:11:37.034240444Z" level=info msg="StartContainer for \"a1d7747d9e6d1d8217aa2c95cfbd75999a99054d6088eca871260306e4ede505\"" Dec 13 02:11:37.065826 systemd[1]: Started cri-containerd-a1d7747d9e6d1d8217aa2c95cfbd75999a99054d6088eca871260306e4ede505.scope. Dec 13 02:11:37.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:37.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:37.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:37.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:37.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:37.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:37.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:37.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:37.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:37.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:37.087000 audit: BPF prog-id=171 op=LOAD Dec 13 02:11:37.088000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:37.088000 audit[3439]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3395 pid=3439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:37.088000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131643737343764396536643164383231376161326339356366626437 Dec 13 02:11:37.088000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:37.088000 audit[3439]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3395 pid=3439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:37.088000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131643737343764396536643164383231376161326339356366626437 Dec 13 02:11:37.088000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:37.088000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:37.088000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:37.088000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:37.088000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:37.088000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:37.088000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:37.088000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:37.088000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:37.088000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:37.088000 audit: BPF prog-id=172 op=LOAD Dec 13 02:11:37.088000 audit[3439]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0001e1fc0 items=0 ppid=3395 pid=3439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:37.088000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131643737343764396536643164383231376161326339356366626437 Dec 13 02:11:37.089000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:37.089000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:37.089000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:37.089000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:37.089000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:37.089000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:37.089000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:37.089000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:37.089000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:37.089000 audit: BPF prog-id=173 op=LOAD Dec 13 02:11:37.089000 audit[3439]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00039a008 items=0 ppid=3395 pid=3439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:37.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131643737343764396536643164383231376161326339356366626437 Dec 13 02:11:37.089000 audit: BPF prog-id=173 op=UNLOAD Dec 13 02:11:37.089000 audit: BPF prog-id=172 op=UNLOAD Dec 13 02:11:37.089000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:37.089000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:37.089000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:37.089000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:37.089000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:37.089000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:37.089000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:37.089000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:37.089000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:37.089000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:37.089000 audit: BPF prog-id=174 op=LOAD Dec 13 02:11:37.089000 audit[3439]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00039a418 items=0 ppid=3395 pid=3439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:37.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131643737343764396536643164383231376161326339356366626437 Dec 13 02:11:37.109494 env[1220]: time="2024-12-13T02:11:37.109361785Z" level=info msg="StartContainer for \"a1d7747d9e6d1d8217aa2c95cfbd75999a99054d6088eca871260306e4ede505\" returns successfully" Dec 13 02:11:37.551731 env[1220]: time="2024-12-13T02:11:37.551674994Z" level=info msg="StopPodSandbox for \"45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e\"" Dec 13 02:11:37.553449 env[1220]: time="2024-12-13T02:11:37.552480841Z" level=info msg="StopPodSandbox for \"21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf\"" Dec 13 02:11:37.554302 env[1220]: time="2024-12-13T02:11:37.552525659Z" level=info msg="StopPodSandbox for \"bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d\"" Dec 13 02:11:37.554668 env[1220]: time="2024-12-13T02:11:37.552693456Z" level=info msg="StopPodSandbox for \"c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae\"" Dec 13 02:11:37.872915 env[1220]: 2024-12-13 02:11:37.714 [INFO][3529] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d" Dec 13 02:11:37.872915 env[1220]: 2024-12-13 02:11:37.714 [INFO][3529] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d" iface="eth0" netns="/var/run/netns/cni-d9cab21a-2dfa-03bc-98bb-d13e4f3e0f79" Dec 13 02:11:37.872915 env[1220]: 2024-12-13 02:11:37.714 [INFO][3529] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d" iface="eth0" netns="/var/run/netns/cni-d9cab21a-2dfa-03bc-98bb-d13e4f3e0f79" Dec 13 02:11:37.872915 env[1220]: 2024-12-13 02:11:37.715 [INFO][3529] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d" iface="eth0" netns="/var/run/netns/cni-d9cab21a-2dfa-03bc-98bb-d13e4f3e0f79" Dec 13 02:11:37.872915 env[1220]: 2024-12-13 02:11:37.715 [INFO][3529] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d" Dec 13 02:11:37.872915 env[1220]: 2024-12-13 02:11:37.715 [INFO][3529] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d" Dec 13 02:11:37.872915 env[1220]: 2024-12-13 02:11:37.818 [INFO][3544] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d" HandleID="k8s-pod-network.bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--t9c25-eth0" Dec 13 02:11:37.872915 env[1220]: 2024-12-13 02:11:37.821 [INFO][3544] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:11:37.872915 env[1220]: 2024-12-13 02:11:37.821 [INFO][3544] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:11:37.872915 env[1220]: 2024-12-13 02:11:37.850 [WARNING][3544] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d" HandleID="k8s-pod-network.bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--t9c25-eth0" Dec 13 02:11:37.872915 env[1220]: 2024-12-13 02:11:37.850 [INFO][3544] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d" HandleID="k8s-pod-network.bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--t9c25-eth0" Dec 13 02:11:37.872915 env[1220]: 2024-12-13 02:11:37.861 [INFO][3544] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:11:37.872915 env[1220]: 2024-12-13 02:11:37.863 [INFO][3529] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d" Dec 13 02:11:37.872915 env[1220]: time="2024-12-13T02:11:37.870100267Z" level=info msg="TearDown network for sandbox \"bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d\" successfully" Dec 13 02:11:37.872915 env[1220]: time="2024-12-13T02:11:37.870166439Z" level=info msg="StopPodSandbox for \"bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d\" returns successfully" Dec 13 02:11:37.872915 env[1220]: time="2024-12-13T02:11:37.871071583Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7589d484d8-t9c25,Uid:7c7a4d1e-cded-4c6b-9d19-1c05bd20a799,Namespace:calico-apiserver,Attempt:1,}" Dec 13 02:11:37.869975 systemd[1]: run-netns-cni\x2dd9cab21a\x2d2dfa\x2d03bc\x2d98bb\x2dd13e4f3e0f79.mount: Deactivated successfully. Dec 13 02:11:37.922874 kubelet[2032]: I1213 02:11:37.922772 2032 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-q8jtg" podStartSLOduration=36.922722939 podStartE2EDuration="36.922722939s" podCreationTimestamp="2024-12-13 02:11:01 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:11:37.922025015 +0000 UTC m=+44.520495421" watchObservedRunningTime="2024-12-13 02:11:37.922722939 +0000 UTC m=+44.521193350" Dec 13 02:11:37.950670 systemd-networkd[1019]: cali0ae47e793ae: Gained IPv6LL Dec 13 02:11:38.051342 env[1220]: 2024-12-13 02:11:37.841 [INFO][3518] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf" Dec 13 02:11:38.051342 env[1220]: 2024-12-13 02:11:37.841 [INFO][3518] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf" iface="eth0" netns="/var/run/netns/cni-55baa135-d025-0798-9edd-c244902a3c2e" Dec 13 02:11:38.051342 env[1220]: 2024-12-13 02:11:37.841 [INFO][3518] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf" iface="eth0" netns="/var/run/netns/cni-55baa135-d025-0798-9edd-c244902a3c2e" Dec 13 02:11:38.051342 env[1220]: 2024-12-13 02:11:37.841 [INFO][3518] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf" iface="eth0" netns="/var/run/netns/cni-55baa135-d025-0798-9edd-c244902a3c2e" Dec 13 02:11:38.051342 env[1220]: 2024-12-13 02:11:37.841 [INFO][3518] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf" Dec 13 02:11:38.051342 env[1220]: 2024-12-13 02:11:37.841 [INFO][3518] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf" Dec 13 02:11:38.051342 env[1220]: 2024-12-13 02:11:38.014 [INFO][3563] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf" HandleID="k8s-pod-network.21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--nbqzv-eth0" Dec 13 02:11:38.051342 env[1220]: 2024-12-13 02:11:38.014 [INFO][3563] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:11:38.051342 env[1220]: 2024-12-13 02:11:38.016 [INFO][3563] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:11:38.051342 env[1220]: 2024-12-13 02:11:38.041 [WARNING][3563] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf" HandleID="k8s-pod-network.21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--nbqzv-eth0" Dec 13 02:11:38.051342 env[1220]: 2024-12-13 02:11:38.041 [INFO][3563] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf" HandleID="k8s-pod-network.21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--nbqzv-eth0" Dec 13 02:11:38.051342 env[1220]: 2024-12-13 02:11:38.044 [INFO][3563] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:11:38.051342 env[1220]: 2024-12-13 02:11:38.049 [INFO][3518] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf" Dec 13 02:11:38.057508 env[1220]: time="2024-12-13T02:11:38.056045927Z" level=info msg="TearDown network for sandbox \"21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf\" successfully" Dec 13 02:11:38.057508 env[1220]: time="2024-12-13T02:11:38.056107811Z" level=info msg="StopPodSandbox for \"21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf\" returns successfully" Dec 13 02:11:38.056397 systemd[1]: run-netns-cni\x2d55baa135\x2dd025\x2d0798\x2d9edd\x2dc244902a3c2e.mount: Deactivated successfully. Dec 13 02:11:38.058138 env[1220]: time="2024-12-13T02:11:38.058086611Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7589d484d8-nbqzv,Uid:f5765683-2ccd-4f71-9c39-d946c348ae32,Namespace:calico-apiserver,Attempt:1,}" Dec 13 02:11:38.115453 env[1220]: 2024-12-13 02:11:37.802 [INFO][3528] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" Dec 13 02:11:38.115453 env[1220]: 2024-12-13 02:11:37.803 [INFO][3528] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" iface="eth0" netns="/var/run/netns/cni-598cabc0-68c3-3c99-c5d7-fbacee101344" Dec 13 02:11:38.115453 env[1220]: 2024-12-13 02:11:37.803 [INFO][3528] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" iface="eth0" netns="/var/run/netns/cni-598cabc0-68c3-3c99-c5d7-fbacee101344" Dec 13 02:11:38.115453 env[1220]: 2024-12-13 02:11:37.804 [INFO][3528] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" iface="eth0" netns="/var/run/netns/cni-598cabc0-68c3-3c99-c5d7-fbacee101344" Dec 13 02:11:38.115453 env[1220]: 2024-12-13 02:11:37.804 [INFO][3528] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" Dec 13 02:11:38.115453 env[1220]: 2024-12-13 02:11:37.804 [INFO][3528] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" Dec 13 02:11:38.115453 env[1220]: 2024-12-13 02:11:38.028 [INFO][3552] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" HandleID="k8s-pod-network.c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--665858c48b--kkf7t-eth0" Dec 13 02:11:38.115453 env[1220]: 2024-12-13 02:11:38.044 [INFO][3552] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:11:38.115453 env[1220]: 2024-12-13 02:11:38.044 [INFO][3552] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:11:38.115453 env[1220]: 2024-12-13 02:11:38.072 [WARNING][3552] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" HandleID="k8s-pod-network.c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--665858c48b--kkf7t-eth0" Dec 13 02:11:38.115453 env[1220]: 2024-12-13 02:11:38.072 [INFO][3552] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" HandleID="k8s-pod-network.c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--665858c48b--kkf7t-eth0" Dec 13 02:11:38.115453 env[1220]: 2024-12-13 02:11:38.110 [INFO][3552] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:11:38.115453 env[1220]: 2024-12-13 02:11:38.113 [INFO][3528] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" Dec 13 02:11:38.116241 env[1220]: time="2024-12-13T02:11:38.115587975Z" level=info msg="TearDown network for sandbox \"c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae\" successfully" Dec 13 02:11:38.116241 env[1220]: time="2024-12-13T02:11:38.115634248Z" level=info msg="StopPodSandbox for \"c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae\" returns successfully" Dec 13 02:11:38.117022 env[1220]: time="2024-12-13T02:11:38.116983812Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-665858c48b-kkf7t,Uid:9822e74c-ada1-4078-8969-5a4ec5af77af,Namespace:calico-system,Attempt:1,}" Dec 13 02:11:38.123000 audit[3591]: NETFILTER_CFG table=filter:102 family=2 entries=16 op=nft_register_rule pid=3591 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:11:38.131981 kernel: kauditd_printk_skb: 671 callbacks suppressed Dec 13 02:11:38.132100 kernel: audit: type=1325 audit(1734055898.123:1050): table=filter:102 family=2 entries=16 op=nft_register_rule pid=3591 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:11:38.123000 audit[3591]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc450e91f0 a2=0 a3=7ffc450e91dc items=0 ppid=2179 pid=3591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:38.123000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:11:38.211172 kernel: audit: type=1300 audit(1734055898.123:1050): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc450e91f0 a2=0 a3=7ffc450e91dc items=0 ppid=2179 pid=3591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:38.211302 kernel: audit: type=1327 audit(1734055898.123:1050): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:11:38.211364 kernel: audit: type=1325 audit(1734055898.207:1051): table=nat:103 family=2 entries=14 op=nft_register_rule pid=3591 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:11:38.207000 audit[3591]: NETFILTER_CFG table=nat:103 family=2 entries=14 op=nft_register_rule pid=3591 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:11:38.211521 env[1220]: 2024-12-13 02:11:37.819 [INFO][3519] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e" Dec 13 02:11:38.211521 env[1220]: 2024-12-13 02:11:37.819 [INFO][3519] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e" iface="eth0" netns="/var/run/netns/cni-74bd1512-8135-77b5-4119-c266530ec1f1" Dec 13 02:11:38.211521 env[1220]: 2024-12-13 02:11:37.819 [INFO][3519] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e" iface="eth0" netns="/var/run/netns/cni-74bd1512-8135-77b5-4119-c266530ec1f1" Dec 13 02:11:38.211521 env[1220]: 2024-12-13 02:11:37.820 [INFO][3519] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e" iface="eth0" netns="/var/run/netns/cni-74bd1512-8135-77b5-4119-c266530ec1f1" Dec 13 02:11:38.211521 env[1220]: 2024-12-13 02:11:37.820 [INFO][3519] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e" Dec 13 02:11:38.211521 env[1220]: 2024-12-13 02:11:37.820 [INFO][3519] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e" Dec 13 02:11:38.211521 env[1220]: 2024-12-13 02:11:38.058 [INFO][3554] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e" HandleID="k8s-pod-network.45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-csi--node--driver--8brk9-eth0" Dec 13 02:11:38.211521 env[1220]: 2024-12-13 02:11:38.059 [INFO][3554] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:11:38.211521 env[1220]: 2024-12-13 02:11:38.111 [INFO][3554] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:11:38.211521 env[1220]: 2024-12-13 02:11:38.179 [WARNING][3554] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e" HandleID="k8s-pod-network.45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-csi--node--driver--8brk9-eth0" Dec 13 02:11:38.211521 env[1220]: 2024-12-13 02:11:38.180 [INFO][3554] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e" HandleID="k8s-pod-network.45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-csi--node--driver--8brk9-eth0" Dec 13 02:11:38.211521 env[1220]: 2024-12-13 02:11:38.197 [INFO][3554] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:11:38.211521 env[1220]: 2024-12-13 02:11:38.202 [INFO][3519] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e" Dec 13 02:11:38.211521 env[1220]: time="2024-12-13T02:11:38.207874358Z" level=info msg="TearDown network for sandbox \"45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e\" successfully" Dec 13 02:11:38.211521 env[1220]: time="2024-12-13T02:11:38.207919221Z" level=info msg="StopPodSandbox for \"45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e\" returns successfully" Dec 13 02:11:38.226155 env[1220]: time="2024-12-13T02:11:38.226099493Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-8brk9,Uid:f4842bfe-3151-4850-b245-0e4d809afe99,Namespace:calico-system,Attempt:1,}" Dec 13 02:11:38.207000 audit[3591]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffc450e91f0 a2=0 a3=0 items=0 ppid=2179 pid=3591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:38.270633 kernel: audit: type=1300 audit(1734055898.207:1051): arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffc450e91f0 a2=0 a3=0 items=0 ppid=2179 pid=3591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:38.207000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:11:38.298811 kernel: audit: type=1327 audit(1734055898.207:1051): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:11:38.341000 audit[3625]: NETFILTER_CFG table=filter:104 family=2 entries=13 op=nft_register_rule pid=3625 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:11:38.360601 kernel: audit: type=1325 audit(1734055898.341:1052): table=filter:104 family=2 entries=13 op=nft_register_rule pid=3625 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:11:38.341000 audit[3625]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe908b9fe0 a2=0 a3=7ffe908b9fcc items=0 ppid=2179 pid=3625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:38.398599 kernel: audit: type=1300 audit(1734055898.341:1052): arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe908b9fe0 a2=0 a3=7ffe908b9fcc items=0 ppid=2179 pid=3625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:38.341000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:11:38.418597 kernel: audit: type=1327 audit(1734055898.341:1052): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:11:38.402000 audit[3625]: NETFILTER_CFG table=nat:105 family=2 entries=35 op=nft_register_chain pid=3625 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:11:38.439669 kernel: audit: type=1325 audit(1734055898.402:1053): table=nat:105 family=2 entries=35 op=nft_register_chain pid=3625 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:11:38.402000 audit[3625]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffe908b9fe0 a2=0 a3=7ffe908b9fcc items=0 ppid=2179 pid=3625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:38.402000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:11:38.549264 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:11:38.549385 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6bcbabe17ce: link becomes ready Dec 13 02:11:38.560172 systemd-networkd[1019]: cali6bcbabe17ce: Link UP Dec 13 02:11:38.560491 systemd-networkd[1019]: cali6bcbabe17ce: Gained carrier Dec 13 02:11:38.585915 env[1220]: 2024-12-13 02:11:38.218 [INFO][3567] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--t9c25-eth0 calico-apiserver-7589d484d8- calico-apiserver 7c7a4d1e-cded-4c6b-9d19-1c05bd20a799 822 0 2024-12-13 02:11:13 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7589d484d8 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal calico-apiserver-7589d484d8-t9c25 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali6bcbabe17ce [] []}} ContainerID="a6d3681dd35197138d7e5db2e03fc4add16132fb07942cce53c7f456dfa7a292" Namespace="calico-apiserver" Pod="calico-apiserver-7589d484d8-t9c25" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--t9c25-" Dec 13 02:11:38.585915 env[1220]: 2024-12-13 02:11:38.218 [INFO][3567] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a6d3681dd35197138d7e5db2e03fc4add16132fb07942cce53c7f456dfa7a292" Namespace="calico-apiserver" Pod="calico-apiserver-7589d484d8-t9c25" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--t9c25-eth0" Dec 13 02:11:38.585915 env[1220]: 2024-12-13 02:11:38.451 [INFO][3609] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a6d3681dd35197138d7e5db2e03fc4add16132fb07942cce53c7f456dfa7a292" HandleID="k8s-pod-network.a6d3681dd35197138d7e5db2e03fc4add16132fb07942cce53c7f456dfa7a292" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--t9c25-eth0" Dec 13 02:11:38.585915 env[1220]: 2024-12-13 02:11:38.465 [INFO][3609] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a6d3681dd35197138d7e5db2e03fc4add16132fb07942cce53c7f456dfa7a292" HandleID="k8s-pod-network.a6d3681dd35197138d7e5db2e03fc4add16132fb07942cce53c7f456dfa7a292" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--t9c25-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003114f0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal", "pod":"calico-apiserver-7589d484d8-t9c25", "timestamp":"2024-12-13 02:11:38.451302692 +0000 UTC"}, Hostname:"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:11:38.585915 env[1220]: 2024-12-13 02:11:38.465 [INFO][3609] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:11:38.585915 env[1220]: 2024-12-13 02:11:38.465 [INFO][3609] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:11:38.585915 env[1220]: 2024-12-13 02:11:38.465 [INFO][3609] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal' Dec 13 02:11:38.585915 env[1220]: 2024-12-13 02:11:38.470 [INFO][3609] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a6d3681dd35197138d7e5db2e03fc4add16132fb07942cce53c7f456dfa7a292" host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:38.585915 env[1220]: 2024-12-13 02:11:38.485 [INFO][3609] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:38.585915 env[1220]: 2024-12-13 02:11:38.492 [INFO][3609] ipam/ipam.go 489: Trying affinity for 192.168.99.0/26 host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:38.585915 env[1220]: 2024-12-13 02:11:38.497 [INFO][3609] ipam/ipam.go 155: Attempting to load block cidr=192.168.99.0/26 host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:38.585915 env[1220]: 2024-12-13 02:11:38.500 [INFO][3609] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.99.0/26 host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:38.585915 env[1220]: 2024-12-13 02:11:38.500 [INFO][3609] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.99.0/26 handle="k8s-pod-network.a6d3681dd35197138d7e5db2e03fc4add16132fb07942cce53c7f456dfa7a292" host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:38.585915 env[1220]: 2024-12-13 02:11:38.502 [INFO][3609] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.a6d3681dd35197138d7e5db2e03fc4add16132fb07942cce53c7f456dfa7a292 Dec 13 02:11:38.585915 env[1220]: 2024-12-13 02:11:38.509 [INFO][3609] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.99.0/26 handle="k8s-pod-network.a6d3681dd35197138d7e5db2e03fc4add16132fb07942cce53c7f456dfa7a292" host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:38.585915 env[1220]: 2024-12-13 02:11:38.519 [INFO][3609] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.99.2/26] block=192.168.99.0/26 handle="k8s-pod-network.a6d3681dd35197138d7e5db2e03fc4add16132fb07942cce53c7f456dfa7a292" host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:38.585915 env[1220]: 2024-12-13 02:11:38.520 [INFO][3609] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.99.2/26] handle="k8s-pod-network.a6d3681dd35197138d7e5db2e03fc4add16132fb07942cce53c7f456dfa7a292" host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:38.585915 env[1220]: 2024-12-13 02:11:38.520 [INFO][3609] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:11:38.585915 env[1220]: 2024-12-13 02:11:38.520 [INFO][3609] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.99.2/26] IPv6=[] ContainerID="a6d3681dd35197138d7e5db2e03fc4add16132fb07942cce53c7f456dfa7a292" HandleID="k8s-pod-network.a6d3681dd35197138d7e5db2e03fc4add16132fb07942cce53c7f456dfa7a292" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--t9c25-eth0" Dec 13 02:11:38.587548 env[1220]: 2024-12-13 02:11:38.526 [INFO][3567] cni-plugin/k8s.go 386: Populated endpoint ContainerID="a6d3681dd35197138d7e5db2e03fc4add16132fb07942cce53c7f456dfa7a292" Namespace="calico-apiserver" Pod="calico-apiserver-7589d484d8-t9c25" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--t9c25-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--t9c25-eth0", GenerateName:"calico-apiserver-7589d484d8-", Namespace:"calico-apiserver", SelfLink:"", UID:"7c7a4d1e-cded-4c6b-9d19-1c05bd20a799", ResourceVersion:"822", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 11, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7589d484d8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-apiserver-7589d484d8-t9c25", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.99.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6bcbabe17ce", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:11:38.587548 env[1220]: 2024-12-13 02:11:38.526 [INFO][3567] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.99.2/32] ContainerID="a6d3681dd35197138d7e5db2e03fc4add16132fb07942cce53c7f456dfa7a292" Namespace="calico-apiserver" Pod="calico-apiserver-7589d484d8-t9c25" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--t9c25-eth0" Dec 13 02:11:38.587548 env[1220]: 2024-12-13 02:11:38.526 [INFO][3567] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali6bcbabe17ce ContainerID="a6d3681dd35197138d7e5db2e03fc4add16132fb07942cce53c7f456dfa7a292" Namespace="calico-apiserver" Pod="calico-apiserver-7589d484d8-t9c25" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--t9c25-eth0" Dec 13 02:11:38.587548 env[1220]: 2024-12-13 02:11:38.562 [INFO][3567] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a6d3681dd35197138d7e5db2e03fc4add16132fb07942cce53c7f456dfa7a292" Namespace="calico-apiserver" Pod="calico-apiserver-7589d484d8-t9c25" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--t9c25-eth0" Dec 13 02:11:38.587548 env[1220]: 2024-12-13 02:11:38.562 [INFO][3567] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a6d3681dd35197138d7e5db2e03fc4add16132fb07942cce53c7f456dfa7a292" Namespace="calico-apiserver" Pod="calico-apiserver-7589d484d8-t9c25" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--t9c25-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--t9c25-eth0", GenerateName:"calico-apiserver-7589d484d8-", Namespace:"calico-apiserver", SelfLink:"", UID:"7c7a4d1e-cded-4c6b-9d19-1c05bd20a799", ResourceVersion:"822", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 11, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7589d484d8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal", ContainerID:"a6d3681dd35197138d7e5db2e03fc4add16132fb07942cce53c7f456dfa7a292", Pod:"calico-apiserver-7589d484d8-t9c25", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.99.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6bcbabe17ce", MAC:"d6:18:1a:8d:6a:e9", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:11:38.587548 env[1220]: 2024-12-13 02:11:38.581 [INFO][3567] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="a6d3681dd35197138d7e5db2e03fc4add16132fb07942cce53c7f456dfa7a292" Namespace="calico-apiserver" Pod="calico-apiserver-7589d484d8-t9c25" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--t9c25-eth0" Dec 13 02:11:38.632000 audit[3659]: NETFILTER_CFG table=filter:106 family=2 entries=44 op=nft_register_chain pid=3659 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:11:38.632000 audit[3659]: SYSCALL arch=c000003e syscall=46 success=yes exit=24680 a0=3 a1=7ffdf2d024e0 a2=0 a3=7ffdf2d024cc items=0 ppid=3152 pid=3659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:38.632000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:11:38.679827 systemd[1]: run-netns-cni\x2d74bd1512\x2d8135\x2d77b5\x2d4119\x2dc266530ec1f1.mount: Deactivated successfully. Dec 13 02:11:38.679948 systemd[1]: run-netns-cni\x2d598cabc0\x2d68c3\x2d3c99\x2dc5d7\x2dfbacee101344.mount: Deactivated successfully. Dec 13 02:11:38.693697 systemd-networkd[1019]: cali597f316fb57: Link UP Dec 13 02:11:38.706618 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali597f316fb57: link becomes ready Dec 13 02:11:38.703551 systemd-networkd[1019]: cali597f316fb57: Gained carrier Dec 13 02:11:38.735037 env[1220]: time="2024-12-13T02:11:38.723332703Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:11:38.735037 env[1220]: time="2024-12-13T02:11:38.723506059Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:11:38.735037 env[1220]: time="2024-12-13T02:11:38.723592114Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:11:38.735037 env[1220]: time="2024-12-13T02:11:38.723916232Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a6d3681dd35197138d7e5db2e03fc4add16132fb07942cce53c7f456dfa7a292 pid=3670 runtime=io.containerd.runc.v2 Dec 13 02:11:38.747947 env[1220]: 2024-12-13 02:11:38.421 [INFO][3595] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--665858c48b--kkf7t-eth0 calico-kube-controllers-665858c48b- calico-system 9822e74c-ada1-4078-8969-5a4ec5af77af 823 0 2024-12-13 02:11:12 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:665858c48b projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal calico-kube-controllers-665858c48b-kkf7t eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali597f316fb57 [] []}} ContainerID="87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" Namespace="calico-system" Pod="calico-kube-controllers-665858c48b-kkf7t" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--665858c48b--kkf7t-" Dec 13 02:11:38.747947 env[1220]: 2024-12-13 02:11:38.421 [INFO][3595] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" Namespace="calico-system" Pod="calico-kube-controllers-665858c48b-kkf7t" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--665858c48b--kkf7t-eth0" Dec 13 02:11:38.747947 env[1220]: 2024-12-13 02:11:38.532 [INFO][3632] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" HandleID="k8s-pod-network.87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--665858c48b--kkf7t-eth0" Dec 13 02:11:38.747947 env[1220]: 2024-12-13 02:11:38.589 [INFO][3632] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" HandleID="k8s-pod-network.87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--665858c48b--kkf7t-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00039f090), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal", "pod":"calico-kube-controllers-665858c48b-kkf7t", "timestamp":"2024-12-13 02:11:38.532764428 +0000 UTC"}, Hostname:"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:11:38.747947 env[1220]: 2024-12-13 02:11:38.589 [INFO][3632] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:11:38.747947 env[1220]: 2024-12-13 02:11:38.589 [INFO][3632] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:11:38.747947 env[1220]: 2024-12-13 02:11:38.589 [INFO][3632] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal' Dec 13 02:11:38.747947 env[1220]: 2024-12-13 02:11:38.593 [INFO][3632] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:38.747947 env[1220]: 2024-12-13 02:11:38.603 [INFO][3632] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:38.747947 env[1220]: 2024-12-13 02:11:38.620 [INFO][3632] ipam/ipam.go 489: Trying affinity for 192.168.99.0/26 host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:38.747947 env[1220]: 2024-12-13 02:11:38.629 [INFO][3632] ipam/ipam.go 155: Attempting to load block cidr=192.168.99.0/26 host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:38.747947 env[1220]: 2024-12-13 02:11:38.634 [INFO][3632] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.99.0/26 host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:38.747947 env[1220]: 2024-12-13 02:11:38.634 [INFO][3632] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.99.0/26 handle="k8s-pod-network.87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:38.747947 env[1220]: 2024-12-13 02:11:38.636 [INFO][3632] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729 Dec 13 02:11:38.747947 env[1220]: 2024-12-13 02:11:38.647 [INFO][3632] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.99.0/26 handle="k8s-pod-network.87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:38.747947 env[1220]: 2024-12-13 02:11:38.659 [INFO][3632] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.99.3/26] block=192.168.99.0/26 handle="k8s-pod-network.87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:38.747947 env[1220]: 2024-12-13 02:11:38.660 [INFO][3632] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.99.3/26] handle="k8s-pod-network.87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:38.747947 env[1220]: 2024-12-13 02:11:38.660 [INFO][3632] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:11:38.747947 env[1220]: 2024-12-13 02:11:38.660 [INFO][3632] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.99.3/26] IPv6=[] ContainerID="87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" HandleID="k8s-pod-network.87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--665858c48b--kkf7t-eth0" Dec 13 02:11:38.749096 env[1220]: 2024-12-13 02:11:38.662 [INFO][3595] cni-plugin/k8s.go 386: Populated endpoint ContainerID="87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" Namespace="calico-system" Pod="calico-kube-controllers-665858c48b-kkf7t" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--665858c48b--kkf7t-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--665858c48b--kkf7t-eth0", GenerateName:"calico-kube-controllers-665858c48b-", Namespace:"calico-system", SelfLink:"", UID:"9822e74c-ada1-4078-8969-5a4ec5af77af", ResourceVersion:"823", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 11, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"665858c48b", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-kube-controllers-665858c48b-kkf7t", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.99.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali597f316fb57", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:11:38.749096 env[1220]: 2024-12-13 02:11:38.662 [INFO][3595] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.99.3/32] ContainerID="87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" Namespace="calico-system" Pod="calico-kube-controllers-665858c48b-kkf7t" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--665858c48b--kkf7t-eth0" Dec 13 02:11:38.749096 env[1220]: 2024-12-13 02:11:38.662 [INFO][3595] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali597f316fb57 ContainerID="87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" Namespace="calico-system" Pod="calico-kube-controllers-665858c48b-kkf7t" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--665858c48b--kkf7t-eth0" Dec 13 02:11:38.749096 env[1220]: 2024-12-13 02:11:38.708 [INFO][3595] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" Namespace="calico-system" Pod="calico-kube-controllers-665858c48b-kkf7t" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--665858c48b--kkf7t-eth0" Dec 13 02:11:38.749096 env[1220]: 2024-12-13 02:11:38.711 [INFO][3595] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" Namespace="calico-system" Pod="calico-kube-controllers-665858c48b-kkf7t" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--665858c48b--kkf7t-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--665858c48b--kkf7t-eth0", GenerateName:"calico-kube-controllers-665858c48b-", Namespace:"calico-system", SelfLink:"", UID:"9822e74c-ada1-4078-8969-5a4ec5af77af", ResourceVersion:"823", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 11, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"665858c48b", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal", ContainerID:"87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729", Pod:"calico-kube-controllers-665858c48b-kkf7t", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.99.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali597f316fb57", MAC:"ee:20:64:fa:a3:35", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:11:38.749096 env[1220]: 2024-12-13 02:11:38.743 [INFO][3595] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" Namespace="calico-system" Pod="calico-kube-controllers-665858c48b-kkf7t" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--665858c48b--kkf7t-eth0" Dec 13 02:11:38.801936 systemd[1]: run-containerd-runc-k8s.io-a6d3681dd35197138d7e5db2e03fc4add16132fb07942cce53c7f456dfa7a292-runc.2sATvI.mount: Deactivated successfully. Dec 13 02:11:38.816692 systemd[1]: Started cri-containerd-a6d3681dd35197138d7e5db2e03fc4add16132fb07942cce53c7f456dfa7a292.scope. Dec 13 02:11:38.829601 env[1220]: time="2024-12-13T02:11:38.829473330Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:11:38.830159 env[1220]: time="2024-12-13T02:11:38.830102447Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:11:38.830353 env[1220]: time="2024-12-13T02:11:38.830294361Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:11:38.830773 env[1220]: time="2024-12-13T02:11:38.830718592Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729 pid=3707 runtime=io.containerd.runc.v2 Dec 13 02:11:38.835000 audit[3714]: NETFILTER_CFG table=filter:107 family=2 entries=42 op=nft_register_chain pid=3714 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:11:38.835000 audit[3714]: SYSCALL arch=c000003e syscall=46 success=yes exit=21524 a0=3 a1=7ffefcdf9800 a2=0 a3=7ffefcdf97ec items=0 ppid=3152 pid=3714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:38.835000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:11:38.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:38.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:38.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:38.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:38.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:38.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:38.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:38.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:38.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:38.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:38.873000 audit: BPF prog-id=175 op=LOAD Dec 13 02:11:38.875000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:38.875000 audit[3682]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3670 pid=3682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:38.875000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136643336383164643335313937313338643765356462326530336663 Dec 13 02:11:38.875000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:38.875000 audit[3682]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3670 pid=3682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:38.875000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136643336383164643335313937313338643765356462326530336663 Dec 13 02:11:38.876000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:38.876000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:38.876000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:38.876000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:38.876000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:38.876000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:38.876000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:38.876000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:38.876000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:38.876000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:38.876000 audit: BPF prog-id=176 op=LOAD Dec 13 02:11:38.876000 audit[3682]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00020b530 items=0 ppid=3670 pid=3682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:38.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136643336383164643335313937313338643765356462326530336663 Dec 13 02:11:38.877000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:38.877000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:38.877000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:38.877000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:38.877000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:38.877000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:38.877000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:38.877000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:38.877000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:38.877000 audit: BPF prog-id=177 op=LOAD Dec 13 02:11:38.877000 audit[3682]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00020b578 items=0 ppid=3670 pid=3682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:38.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136643336383164643335313937313338643765356462326530336663 Dec 13 02:11:38.879000 audit: BPF prog-id=177 op=UNLOAD Dec 13 02:11:38.879000 audit: BPF prog-id=176 op=UNLOAD Dec 13 02:11:38.879000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:38.879000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:38.879000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:38.879000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:38.879000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:38.879000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:38.879000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:38.879000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:38.879000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:38.879000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:38.879000 audit: BPF prog-id=178 op=LOAD Dec 13 02:11:38.879000 audit[3682]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00020b988 items=0 ppid=3670 pid=3682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:38.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136643336383164643335313937313338643765356462326530336663 Dec 13 02:11:38.913106 systemd-networkd[1019]: cali8025f22c9b9: Link UP Dec 13 02:11:38.922530 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8025f22c9b9: link becomes ready Dec 13 02:11:38.930254 systemd-networkd[1019]: cali8025f22c9b9: Gained carrier Dec 13 02:11:38.949956 systemd[1]: Started cri-containerd-87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729.scope. Dec 13 02:11:38.982869 env[1220]: 2024-12-13 02:11:38.361 [INFO][3583] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--nbqzv-eth0 calico-apiserver-7589d484d8- calico-apiserver f5765683-2ccd-4f71-9c39-d946c348ae32 825 0 2024-12-13 02:11:13 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7589d484d8 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal calico-apiserver-7589d484d8-nbqzv eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali8025f22c9b9 [] []}} ContainerID="d9bc1e46ff3d4dce38ec8356146a5b75698e7229100f2e8e8ba76946092befff" Namespace="calico-apiserver" Pod="calico-apiserver-7589d484d8-nbqzv" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--nbqzv-" Dec 13 02:11:38.982869 env[1220]: 2024-12-13 02:11:38.361 [INFO][3583] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="d9bc1e46ff3d4dce38ec8356146a5b75698e7229100f2e8e8ba76946092befff" Namespace="calico-apiserver" Pod="calico-apiserver-7589d484d8-nbqzv" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--nbqzv-eth0" Dec 13 02:11:38.982869 env[1220]: 2024-12-13 02:11:38.699 [INFO][3630] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d9bc1e46ff3d4dce38ec8356146a5b75698e7229100f2e8e8ba76946092befff" HandleID="k8s-pod-network.d9bc1e46ff3d4dce38ec8356146a5b75698e7229100f2e8e8ba76946092befff" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--nbqzv-eth0" Dec 13 02:11:38.982869 env[1220]: 2024-12-13 02:11:38.827 [INFO][3630] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d9bc1e46ff3d4dce38ec8356146a5b75698e7229100f2e8e8ba76946092befff" HandleID="k8s-pod-network.d9bc1e46ff3d4dce38ec8356146a5b75698e7229100f2e8e8ba76946092befff" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--nbqzv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003a37c0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal", "pod":"calico-apiserver-7589d484d8-nbqzv", "timestamp":"2024-12-13 02:11:38.69802041 +0000 UTC"}, Hostname:"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:11:38.982869 env[1220]: 2024-12-13 02:11:38.827 [INFO][3630] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:11:38.982869 env[1220]: 2024-12-13 02:11:38.827 [INFO][3630] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:11:38.982869 env[1220]: 2024-12-13 02:11:38.827 [INFO][3630] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal' Dec 13 02:11:38.982869 env[1220]: 2024-12-13 02:11:38.831 [INFO][3630] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d9bc1e46ff3d4dce38ec8356146a5b75698e7229100f2e8e8ba76946092befff" host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:38.982869 env[1220]: 2024-12-13 02:11:38.844 [INFO][3630] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:38.982869 env[1220]: 2024-12-13 02:11:38.855 [INFO][3630] ipam/ipam.go 489: Trying affinity for 192.168.99.0/26 host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:38.982869 env[1220]: 2024-12-13 02:11:38.866 [INFO][3630] ipam/ipam.go 155: Attempting to load block cidr=192.168.99.0/26 host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:38.982869 env[1220]: 2024-12-13 02:11:38.871 [INFO][3630] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.99.0/26 host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:38.982869 env[1220]: 2024-12-13 02:11:38.871 [INFO][3630] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.99.0/26 handle="k8s-pod-network.d9bc1e46ff3d4dce38ec8356146a5b75698e7229100f2e8e8ba76946092befff" host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:38.982869 env[1220]: 2024-12-13 02:11:38.873 [INFO][3630] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.d9bc1e46ff3d4dce38ec8356146a5b75698e7229100f2e8e8ba76946092befff Dec 13 02:11:38.982869 env[1220]: 2024-12-13 02:11:38.880 [INFO][3630] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.99.0/26 handle="k8s-pod-network.d9bc1e46ff3d4dce38ec8356146a5b75698e7229100f2e8e8ba76946092befff" host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:38.982869 env[1220]: 2024-12-13 02:11:38.899 [INFO][3630] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.99.4/26] block=192.168.99.0/26 handle="k8s-pod-network.d9bc1e46ff3d4dce38ec8356146a5b75698e7229100f2e8e8ba76946092befff" host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:38.982869 env[1220]: 2024-12-13 02:11:38.899 [INFO][3630] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.99.4/26] handle="k8s-pod-network.d9bc1e46ff3d4dce38ec8356146a5b75698e7229100f2e8e8ba76946092befff" host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:38.982869 env[1220]: 2024-12-13 02:11:38.899 [INFO][3630] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:11:38.982869 env[1220]: 2024-12-13 02:11:38.899 [INFO][3630] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.99.4/26] IPv6=[] ContainerID="d9bc1e46ff3d4dce38ec8356146a5b75698e7229100f2e8e8ba76946092befff" HandleID="k8s-pod-network.d9bc1e46ff3d4dce38ec8356146a5b75698e7229100f2e8e8ba76946092befff" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--nbqzv-eth0" Dec 13 02:11:38.983860 env[1220]: 2024-12-13 02:11:38.903 [INFO][3583] cni-plugin/k8s.go 386: Populated endpoint ContainerID="d9bc1e46ff3d4dce38ec8356146a5b75698e7229100f2e8e8ba76946092befff" Namespace="calico-apiserver" Pod="calico-apiserver-7589d484d8-nbqzv" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--nbqzv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--nbqzv-eth0", GenerateName:"calico-apiserver-7589d484d8-", Namespace:"calico-apiserver", SelfLink:"", UID:"f5765683-2ccd-4f71-9c39-d946c348ae32", ResourceVersion:"825", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 11, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7589d484d8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-apiserver-7589d484d8-nbqzv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.99.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8025f22c9b9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:11:38.983860 env[1220]: 2024-12-13 02:11:38.903 [INFO][3583] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.99.4/32] ContainerID="d9bc1e46ff3d4dce38ec8356146a5b75698e7229100f2e8e8ba76946092befff" Namespace="calico-apiserver" Pod="calico-apiserver-7589d484d8-nbqzv" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--nbqzv-eth0" Dec 13 02:11:38.983860 env[1220]: 2024-12-13 02:11:38.903 [INFO][3583] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali8025f22c9b9 ContainerID="d9bc1e46ff3d4dce38ec8356146a5b75698e7229100f2e8e8ba76946092befff" Namespace="calico-apiserver" Pod="calico-apiserver-7589d484d8-nbqzv" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--nbqzv-eth0" Dec 13 02:11:38.983860 env[1220]: 2024-12-13 02:11:38.932 [INFO][3583] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d9bc1e46ff3d4dce38ec8356146a5b75698e7229100f2e8e8ba76946092befff" Namespace="calico-apiserver" Pod="calico-apiserver-7589d484d8-nbqzv" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--nbqzv-eth0" Dec 13 02:11:38.983860 env[1220]: 2024-12-13 02:11:38.936 [INFO][3583] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="d9bc1e46ff3d4dce38ec8356146a5b75698e7229100f2e8e8ba76946092befff" Namespace="calico-apiserver" Pod="calico-apiserver-7589d484d8-nbqzv" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--nbqzv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--nbqzv-eth0", GenerateName:"calico-apiserver-7589d484d8-", Namespace:"calico-apiserver", SelfLink:"", UID:"f5765683-2ccd-4f71-9c39-d946c348ae32", ResourceVersion:"825", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 11, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7589d484d8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal", ContainerID:"d9bc1e46ff3d4dce38ec8356146a5b75698e7229100f2e8e8ba76946092befff", Pod:"calico-apiserver-7589d484d8-nbqzv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.99.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8025f22c9b9", MAC:"5a:52:ff:c5:7c:03", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:11:38.983860 env[1220]: 2024-12-13 02:11:38.976 [INFO][3583] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="d9bc1e46ff3d4dce38ec8356146a5b75698e7229100f2e8e8ba76946092befff" Namespace="calico-apiserver" Pod="calico-apiserver-7589d484d8-nbqzv" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--nbqzv-eth0" Dec 13 02:11:39.001283 env[1220]: time="2024-12-13T02:11:39.001189112Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7589d484d8-t9c25,Uid:7c7a4d1e-cded-4c6b-9d19-1c05bd20a799,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"a6d3681dd35197138d7e5db2e03fc4add16132fb07942cce53c7f456dfa7a292\"" Dec 13 02:11:39.008381 env[1220]: time="2024-12-13T02:11:39.008331836Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 02:11:39.021420 env[1220]: time="2024-12-13T02:11:39.021129453Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:11:39.021420 env[1220]: time="2024-12-13T02:11:39.021187147Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:11:39.021420 env[1220]: time="2024-12-13T02:11:39.021206364Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:11:39.022069 env[1220]: time="2024-12-13T02:11:39.022006060Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d9bc1e46ff3d4dce38ec8356146a5b75698e7229100f2e8e8ba76946092befff pid=3767 runtime=io.containerd.runc.v2 Dec 13 02:11:39.022000 audit[3769]: NETFILTER_CFG table=filter:108 family=2 entries=42 op=nft_register_chain pid=3769 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:11:39.022000 audit[3769]: SYSCALL arch=c000003e syscall=46 success=yes exit=22704 a0=3 a1=7fff089dd890 a2=0 a3=7fff089dd87c items=0 ppid=3152 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:39.022000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:11:39.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.045000 audit: BPF prog-id=179 op=LOAD Dec 13 02:11:39.049000 audit[3729]: AVC avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.049000 audit[3729]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3707 pid=3729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:39.049000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837626633313166633235393464656534306361636237643163356130 Dec 13 02:11:39.049000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.049000 audit[3729]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3707 pid=3729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:39.049000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837626633313166633235393464656534306361636237643163356130 Dec 13 02:11:39.049000 audit[3729]: AVC avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.049000 audit[3729]: AVC avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.049000 audit[3729]: AVC avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.049000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.049000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.049000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.049000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.049000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.049000 audit[3729]: AVC avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.049000 audit[3729]: AVC avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.049000 audit: BPF prog-id=180 op=LOAD Dec 13 02:11:39.049000 audit[3729]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000299460 items=0 ppid=3707 pid=3729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:39.049000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837626633313166633235393464656534306361636237643163356130 Dec 13 02:11:39.049000 audit[3729]: AVC avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.049000 audit[3729]: AVC avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.049000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.049000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.049000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.049000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.049000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.049000 audit[3729]: AVC avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.049000 audit[3729]: AVC avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.049000 audit: BPF prog-id=181 op=LOAD Dec 13 02:11:39.049000 audit[3729]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002994a8 items=0 ppid=3707 pid=3729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:39.049000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837626633313166633235393464656534306361636237643163356130 Dec 13 02:11:39.050000 audit: BPF prog-id=181 op=UNLOAD Dec 13 02:11:39.050000 audit: BPF prog-id=180 op=UNLOAD Dec 13 02:11:39.050000 audit[3729]: AVC avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.050000 audit[3729]: AVC avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.050000 audit[3729]: AVC avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.050000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.050000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.050000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.050000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.050000 audit[3729]: AVC avc: denied { perfmon } for pid=3729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.050000 audit[3729]: AVC avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.050000 audit[3729]: AVC avc: denied { bpf } for pid=3729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.050000 audit: BPF prog-id=182 op=LOAD Dec 13 02:11:39.050000 audit[3729]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002998b8 items=0 ppid=3707 pid=3729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:39.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837626633313166633235393464656534306361636237643163356130 Dec 13 02:11:39.058328 systemd[1]: Started cri-containerd-d9bc1e46ff3d4dce38ec8356146a5b75698e7229100f2e8e8ba76946092befff.scope. Dec 13 02:11:39.100957 systemd-networkd[1019]: calif014495a59d: Link UP Dec 13 02:11:39.109790 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif014495a59d: link becomes ready Dec 13 02:11:39.110104 systemd-networkd[1019]: calif014495a59d: Gained carrier Dec 13 02:11:39.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.132000 audit: BPF prog-id=183 op=LOAD Dec 13 02:11:39.135000 audit[3778]: AVC avc: denied { bpf } for pid=3778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.135000 audit[3778]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3767 pid=3778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:39.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439626331653436666633643464636533386563383335363134366135 Dec 13 02:11:39.135000 audit[3778]: AVC avc: denied { perfmon } for pid=3778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.135000 audit[3778]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3767 pid=3778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:39.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439626331653436666633643464636533386563383335363134366135 Dec 13 02:11:39.135000 audit[3778]: AVC avc: denied { bpf } for pid=3778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.135000 audit[3778]: AVC avc: denied { bpf } for pid=3778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.135000 audit[3778]: AVC avc: denied { bpf } for pid=3778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.135000 audit[3778]: AVC avc: denied { perfmon } for pid=3778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.135000 audit[3778]: AVC avc: denied { perfmon } for pid=3778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.135000 audit[3778]: AVC avc: denied { perfmon } for pid=3778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.135000 audit[3778]: AVC avc: denied { perfmon } for pid=3778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.135000 audit[3778]: AVC avc: denied { perfmon } for pid=3778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.135000 audit[3778]: AVC avc: denied { bpf } for pid=3778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.135000 audit[3778]: AVC avc: denied { bpf } for pid=3778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.135000 audit: BPF prog-id=184 op=LOAD Dec 13 02:11:39.135000 audit[3778]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00018fc70 items=0 ppid=3767 pid=3778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:39.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439626331653436666633643464636533386563383335363134366135 Dec 13 02:11:39.136000 audit[3778]: AVC avc: denied { bpf } for pid=3778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.136000 audit[3778]: AVC avc: denied { bpf } for pid=3778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.136000 audit[3778]: AVC avc: denied { perfmon } for pid=3778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.136000 audit[3778]: AVC avc: denied { perfmon } for pid=3778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.136000 audit[3778]: AVC avc: denied { perfmon } for pid=3778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.136000 audit[3778]: AVC avc: denied { perfmon } for pid=3778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.136000 audit[3778]: AVC avc: denied { perfmon } for pid=3778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.136000 audit[3778]: AVC avc: denied { bpf } for pid=3778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.136000 audit[3778]: AVC avc: denied { bpf } for pid=3778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.136000 audit: BPF prog-id=185 op=LOAD Dec 13 02:11:39.136000 audit[3778]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00018fcb8 items=0 ppid=3767 pid=3778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:39.136000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439626331653436666633643464636533386563383335363134366135 Dec 13 02:11:39.136000 audit: BPF prog-id=185 op=UNLOAD Dec 13 02:11:39.136000 audit: BPF prog-id=184 op=UNLOAD Dec 13 02:11:39.136000 audit[3778]: AVC avc: denied { bpf } for pid=3778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.136000 audit[3778]: AVC avc: denied { bpf } for pid=3778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.136000 audit[3778]: AVC avc: denied { bpf } for pid=3778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.136000 audit[3778]: AVC avc: denied { perfmon } for pid=3778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.136000 audit[3778]: AVC avc: denied { perfmon } for pid=3778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.136000 audit[3778]: AVC avc: denied { perfmon } for pid=3778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.136000 audit[3778]: AVC avc: denied { perfmon } for pid=3778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.136000 audit[3778]: AVC avc: denied { perfmon } for pid=3778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.136000 audit[3778]: AVC avc: denied { bpf } for pid=3778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.136000 audit[3778]: AVC avc: denied { bpf } for pid=3778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.136000 audit: BPF prog-id=186 op=LOAD Dec 13 02:11:39.136000 audit[3778]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0004140c8 items=0 ppid=3767 pid=3778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:39.136000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439626331653436666633643464636533386563383335363134366135 Dec 13 02:11:39.147870 env[1220]: 2024-12-13 02:11:38.594 [INFO][3610] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-csi--node--driver--8brk9-eth0 csi-node-driver- calico-system f4842bfe-3151-4850-b245-0e4d809afe99 824 0 2024-12-13 02:11:12 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:56747c9949 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal csi-node-driver-8brk9 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calif014495a59d [] []}} ContainerID="37042aafd5c0db236d15b8634e07996609f39f98acb2bfd95aba16f3b181349c" Namespace="calico-system" Pod="csi-node-driver-8brk9" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-csi--node--driver--8brk9-" Dec 13 02:11:39.147870 env[1220]: 2024-12-13 02:11:38.595 [INFO][3610] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="37042aafd5c0db236d15b8634e07996609f39f98acb2bfd95aba16f3b181349c" Namespace="calico-system" Pod="csi-node-driver-8brk9" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-csi--node--driver--8brk9-eth0" Dec 13 02:11:39.147870 env[1220]: 2024-12-13 02:11:38.886 [INFO][3662] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="37042aafd5c0db236d15b8634e07996609f39f98acb2bfd95aba16f3b181349c" HandleID="k8s-pod-network.37042aafd5c0db236d15b8634e07996609f39f98acb2bfd95aba16f3b181349c" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-csi--node--driver--8brk9-eth0" Dec 13 02:11:39.147870 env[1220]: 2024-12-13 02:11:38.939 [INFO][3662] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="37042aafd5c0db236d15b8634e07996609f39f98acb2bfd95aba16f3b181349c" HandleID="k8s-pod-network.37042aafd5c0db236d15b8634e07996609f39f98acb2bfd95aba16f3b181349c" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-csi--node--driver--8brk9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000050570), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal", "pod":"csi-node-driver-8brk9", "timestamp":"2024-12-13 02:11:38.886311349 +0000 UTC"}, Hostname:"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:11:39.147870 env[1220]: 2024-12-13 02:11:38.939 [INFO][3662] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:11:39.147870 env[1220]: 2024-12-13 02:11:38.939 [INFO][3662] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:11:39.147870 env[1220]: 2024-12-13 02:11:38.939 [INFO][3662] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal' Dec 13 02:11:39.147870 env[1220]: 2024-12-13 02:11:38.955 [INFO][3662] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.37042aafd5c0db236d15b8634e07996609f39f98acb2bfd95aba16f3b181349c" host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:39.147870 env[1220]: 2024-12-13 02:11:39.030 [INFO][3662] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:39.147870 env[1220]: 2024-12-13 02:11:39.041 [INFO][3662] ipam/ipam.go 489: Trying affinity for 192.168.99.0/26 host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:39.147870 env[1220]: 2024-12-13 02:11:39.050 [INFO][3662] ipam/ipam.go 155: Attempting to load block cidr=192.168.99.0/26 host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:39.147870 env[1220]: 2024-12-13 02:11:39.068 [INFO][3662] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.99.0/26 host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:39.147870 env[1220]: 2024-12-13 02:11:39.068 [INFO][3662] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.99.0/26 handle="k8s-pod-network.37042aafd5c0db236d15b8634e07996609f39f98acb2bfd95aba16f3b181349c" host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:39.147870 env[1220]: 2024-12-13 02:11:39.073 [INFO][3662] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.37042aafd5c0db236d15b8634e07996609f39f98acb2bfd95aba16f3b181349c Dec 13 02:11:39.147870 env[1220]: 2024-12-13 02:11:39.080 [INFO][3662] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.99.0/26 handle="k8s-pod-network.37042aafd5c0db236d15b8634e07996609f39f98acb2bfd95aba16f3b181349c" host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:39.147870 env[1220]: 2024-12-13 02:11:39.092 [INFO][3662] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.99.5/26] block=192.168.99.0/26 handle="k8s-pod-network.37042aafd5c0db236d15b8634e07996609f39f98acb2bfd95aba16f3b181349c" host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:39.147870 env[1220]: 2024-12-13 02:11:39.092 [INFO][3662] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.99.5/26] handle="k8s-pod-network.37042aafd5c0db236d15b8634e07996609f39f98acb2bfd95aba16f3b181349c" host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:39.147870 env[1220]: 2024-12-13 02:11:39.092 [INFO][3662] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:11:39.147870 env[1220]: 2024-12-13 02:11:39.092 [INFO][3662] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.99.5/26] IPv6=[] ContainerID="37042aafd5c0db236d15b8634e07996609f39f98acb2bfd95aba16f3b181349c" HandleID="k8s-pod-network.37042aafd5c0db236d15b8634e07996609f39f98acb2bfd95aba16f3b181349c" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-csi--node--driver--8brk9-eth0" Dec 13 02:11:39.149065 env[1220]: 2024-12-13 02:11:39.095 [INFO][3610] cni-plugin/k8s.go 386: Populated endpoint ContainerID="37042aafd5c0db236d15b8634e07996609f39f98acb2bfd95aba16f3b181349c" Namespace="calico-system" Pod="csi-node-driver-8brk9" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-csi--node--driver--8brk9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-csi--node--driver--8brk9-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f4842bfe-3151-4850-b245-0e4d809afe99", ResourceVersion:"824", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 11, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal", ContainerID:"", Pod:"csi-node-driver-8brk9", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.99.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calif014495a59d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:11:39.149065 env[1220]: 2024-12-13 02:11:39.096 [INFO][3610] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.99.5/32] ContainerID="37042aafd5c0db236d15b8634e07996609f39f98acb2bfd95aba16f3b181349c" Namespace="calico-system" Pod="csi-node-driver-8brk9" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-csi--node--driver--8brk9-eth0" Dec 13 02:11:39.149065 env[1220]: 2024-12-13 02:11:39.096 [INFO][3610] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calif014495a59d ContainerID="37042aafd5c0db236d15b8634e07996609f39f98acb2bfd95aba16f3b181349c" Namespace="calico-system" Pod="csi-node-driver-8brk9" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-csi--node--driver--8brk9-eth0" Dec 13 02:11:39.149065 env[1220]: 2024-12-13 02:11:39.110 [INFO][3610] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="37042aafd5c0db236d15b8634e07996609f39f98acb2bfd95aba16f3b181349c" Namespace="calico-system" Pod="csi-node-driver-8brk9" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-csi--node--driver--8brk9-eth0" Dec 13 02:11:39.149065 env[1220]: 2024-12-13 02:11:39.112 [INFO][3610] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="37042aafd5c0db236d15b8634e07996609f39f98acb2bfd95aba16f3b181349c" Namespace="calico-system" Pod="csi-node-driver-8brk9" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-csi--node--driver--8brk9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-csi--node--driver--8brk9-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f4842bfe-3151-4850-b245-0e4d809afe99", ResourceVersion:"824", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 11, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal", ContainerID:"37042aafd5c0db236d15b8634e07996609f39f98acb2bfd95aba16f3b181349c", Pod:"csi-node-driver-8brk9", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.99.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calif014495a59d", MAC:"4e:6e:1c:7d:aa:c7", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:11:39.149065 env[1220]: 2024-12-13 02:11:39.141 [INFO][3610] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="37042aafd5c0db236d15b8634e07996609f39f98acb2bfd95aba16f3b181349c" Namespace="calico-system" Pod="csi-node-driver-8brk9" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-csi--node--driver--8brk9-eth0" Dec 13 02:11:39.172935 env[1220]: time="2024-12-13T02:11:39.172867921Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-665858c48b-kkf7t,Uid:9822e74c-ada1-4078-8969-5a4ec5af77af,Namespace:calico-system,Attempt:1,} returns sandbox id \"87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729\"" Dec 13 02:11:39.200000 audit[3828]: NETFILTER_CFG table=filter:109 family=2 entries=46 op=nft_register_chain pid=3828 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:11:39.200000 audit[3828]: SYSCALL arch=c000003e syscall=46 success=yes exit=22204 a0=3 a1=7ffd789f2ad0 a2=0 a3=7ffd789f2abc items=0 ppid=3152 pid=3828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:39.200000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:11:39.208224 env[1220]: time="2024-12-13T02:11:39.208117037Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:11:39.208479 env[1220]: time="2024-12-13T02:11:39.208190063Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:11:39.208479 env[1220]: time="2024-12-13T02:11:39.208208029Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:11:39.208691 env[1220]: time="2024-12-13T02:11:39.208614497Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/37042aafd5c0db236d15b8634e07996609f39f98acb2bfd95aba16f3b181349c pid=3827 runtime=io.containerd.runc.v2 Dec 13 02:11:39.230305 systemd[1]: Started cri-containerd-37042aafd5c0db236d15b8634e07996609f39f98acb2bfd95aba16f3b181349c.scope. Dec 13 02:11:39.259251 env[1220]: time="2024-12-13T02:11:39.259186762Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7589d484d8-nbqzv,Uid:f5765683-2ccd-4f71-9c39-d946c348ae32,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"d9bc1e46ff3d4dce38ec8356146a5b75698e7229100f2e8e8ba76946092befff\"" Dec 13 02:11:39.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.278000 audit: BPF prog-id=187 op=LOAD Dec 13 02:11:39.278000 audit[3839]: AVC avc: denied { bpf } for pid=3839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.278000 audit[3839]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3827 pid=3839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:39.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337303432616166643563306462323336643135623836333465303739 Dec 13 02:11:39.278000 audit[3839]: AVC avc: denied { perfmon } for pid=3839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.278000 audit[3839]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3827 pid=3839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:39.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337303432616166643563306462323336643135623836333465303739 Dec 13 02:11:39.278000 audit[3839]: AVC avc: denied { bpf } for pid=3839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.278000 audit[3839]: AVC avc: denied { bpf } for pid=3839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.278000 audit[3839]: AVC avc: denied { bpf } for pid=3839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.278000 audit[3839]: AVC avc: denied { perfmon } for pid=3839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.278000 audit[3839]: AVC avc: denied { perfmon } for pid=3839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.278000 audit[3839]: AVC avc: denied { perfmon } for pid=3839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.278000 audit[3839]: AVC avc: denied { perfmon } for pid=3839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.278000 audit[3839]: AVC avc: denied { perfmon } for pid=3839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.278000 audit[3839]: AVC avc: denied { bpf } for pid=3839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.278000 audit[3839]: AVC avc: denied { bpf } for pid=3839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.278000 audit: BPF prog-id=188 op=LOAD Dec 13 02:11:39.278000 audit[3839]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d6ab0 items=0 ppid=3827 pid=3839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:39.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337303432616166643563306462323336643135623836333465303739 Dec 13 02:11:39.279000 audit[3839]: AVC avc: denied { bpf } for pid=3839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.279000 audit[3839]: AVC avc: denied { bpf } for pid=3839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.279000 audit[3839]: AVC avc: denied { perfmon } for pid=3839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.279000 audit[3839]: AVC avc: denied { perfmon } for pid=3839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.279000 audit[3839]: AVC avc: denied { perfmon } for pid=3839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.279000 audit[3839]: AVC avc: denied { perfmon } for pid=3839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.279000 audit[3839]: AVC avc: denied { perfmon } for pid=3839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.279000 audit[3839]: AVC avc: denied { bpf } for pid=3839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.279000 audit[3839]: AVC avc: denied { bpf } for pid=3839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.279000 audit: BPF prog-id=189 op=LOAD Dec 13 02:11:39.279000 audit[3839]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d6af8 items=0 ppid=3827 pid=3839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:39.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337303432616166643563306462323336643135623836333465303739 Dec 13 02:11:39.279000 audit: BPF prog-id=189 op=UNLOAD Dec 13 02:11:39.279000 audit: BPF prog-id=188 op=UNLOAD Dec 13 02:11:39.279000 audit[3839]: AVC avc: denied { bpf } for pid=3839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.279000 audit[3839]: AVC avc: denied { bpf } for pid=3839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.279000 audit[3839]: AVC avc: denied { bpf } for pid=3839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.279000 audit[3839]: AVC avc: denied { perfmon } for pid=3839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.279000 audit[3839]: AVC avc: denied { perfmon } for pid=3839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.279000 audit[3839]: AVC avc: denied { perfmon } for pid=3839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.279000 audit[3839]: AVC avc: denied { perfmon } for pid=3839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.279000 audit[3839]: AVC avc: denied { perfmon } for pid=3839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.279000 audit[3839]: AVC avc: denied { bpf } for pid=3839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.279000 audit[3839]: AVC avc: denied { bpf } for pid=3839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:39.279000 audit: BPF prog-id=190 op=LOAD Dec 13 02:11:39.279000 audit[3839]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d6f08 items=0 ppid=3827 pid=3839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:39.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337303432616166643563306462323336643135623836333465303739 Dec 13 02:11:39.298526 env[1220]: time="2024-12-13T02:11:39.298461400Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-8brk9,Uid:f4842bfe-3151-4850-b245-0e4d809afe99,Namespace:calico-system,Attempt:1,} returns sandbox id \"37042aafd5c0db236d15b8634e07996609f39f98acb2bfd95aba16f3b181349c\"" Dec 13 02:11:39.807147 systemd-networkd[1019]: cali6bcbabe17ce: Gained IPv6LL Dec 13 02:11:39.934346 systemd-networkd[1019]: cali597f316fb57: Gained IPv6LL Dec 13 02:11:40.445828 systemd-networkd[1019]: cali8025f22c9b9: Gained IPv6LL Dec 13 02:11:40.550879 env[1220]: time="2024-12-13T02:11:40.550821914Z" level=info msg="StopPodSandbox for \"db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4\"" Dec 13 02:11:40.746164 env[1220]: 2024-12-13 02:11:40.667 [INFO][3891] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4" Dec 13 02:11:40.746164 env[1220]: 2024-12-13 02:11:40.668 [INFO][3891] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4" iface="eth0" netns="/var/run/netns/cni-0ac33a41-ff57-e008-91b9-9347e11707eb" Dec 13 02:11:40.746164 env[1220]: 2024-12-13 02:11:40.669 [INFO][3891] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4" iface="eth0" netns="/var/run/netns/cni-0ac33a41-ff57-e008-91b9-9347e11707eb" Dec 13 02:11:40.746164 env[1220]: 2024-12-13 02:11:40.670 [INFO][3891] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4" iface="eth0" netns="/var/run/netns/cni-0ac33a41-ff57-e008-91b9-9347e11707eb" Dec 13 02:11:40.746164 env[1220]: 2024-12-13 02:11:40.670 [INFO][3891] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4" Dec 13 02:11:40.746164 env[1220]: 2024-12-13 02:11:40.670 [INFO][3891] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4" Dec 13 02:11:40.746164 env[1220]: 2024-12-13 02:11:40.725 [INFO][3897] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4" HandleID="k8s-pod-network.db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--4qxgx-eth0" Dec 13 02:11:40.746164 env[1220]: 2024-12-13 02:11:40.725 [INFO][3897] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:11:40.746164 env[1220]: 2024-12-13 02:11:40.726 [INFO][3897] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:11:40.746164 env[1220]: 2024-12-13 02:11:40.739 [WARNING][3897] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4" HandleID="k8s-pod-network.db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--4qxgx-eth0" Dec 13 02:11:40.746164 env[1220]: 2024-12-13 02:11:40.739 [INFO][3897] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4" HandleID="k8s-pod-network.db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--4qxgx-eth0" Dec 13 02:11:40.746164 env[1220]: 2024-12-13 02:11:40.741 [INFO][3897] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:11:40.746164 env[1220]: 2024-12-13 02:11:40.743 [INFO][3891] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4" Dec 13 02:11:40.757268 systemd[1]: run-netns-cni\x2d0ac33a41\x2dff57\x2de008\x2d91b9\x2d9347e11707eb.mount: Deactivated successfully. Dec 13 02:11:40.760344 env[1220]: time="2024-12-13T02:11:40.760263570Z" level=info msg="TearDown network for sandbox \"db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4\" successfully" Dec 13 02:11:40.760601 env[1220]: time="2024-12-13T02:11:40.760539996Z" level=info msg="StopPodSandbox for \"db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4\" returns successfully" Dec 13 02:11:40.761915 env[1220]: time="2024-12-13T02:11:40.761876734Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-4qxgx,Uid:38e5368d-879b-4625-afd4-c27aa522644e,Namespace:kube-system,Attempt:1,}" Dec 13 02:11:40.767747 systemd-networkd[1019]: calif014495a59d: Gained IPv6LL Dec 13 02:11:40.990298 systemd-networkd[1019]: cali4fb333717a5: Link UP Dec 13 02:11:41.003199 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:11:41.003344 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4fb333717a5: link becomes ready Dec 13 02:11:41.005000 systemd-networkd[1019]: cali4fb333717a5: Gained carrier Dec 13 02:11:41.029837 env[1220]: 2024-12-13 02:11:40.876 [INFO][3903] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--4qxgx-eth0 coredns-6f6b679f8f- kube-system 38e5368d-879b-4625-afd4-c27aa522644e 855 0 2024-12-13 02:11:01 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal coredns-6f6b679f8f-4qxgx eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali4fb333717a5 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="b9048da2eacd9d23c945c28b520aa124c132a8792f6c668d7314d9ecdfb65a60" Namespace="kube-system" Pod="coredns-6f6b679f8f-4qxgx" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--4qxgx-" Dec 13 02:11:41.029837 env[1220]: 2024-12-13 02:11:40.877 [INFO][3903] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="b9048da2eacd9d23c945c28b520aa124c132a8792f6c668d7314d9ecdfb65a60" Namespace="kube-system" Pod="coredns-6f6b679f8f-4qxgx" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--4qxgx-eth0" Dec 13 02:11:41.029837 env[1220]: 2024-12-13 02:11:40.925 [INFO][3915] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b9048da2eacd9d23c945c28b520aa124c132a8792f6c668d7314d9ecdfb65a60" HandleID="k8s-pod-network.b9048da2eacd9d23c945c28b520aa124c132a8792f6c668d7314d9ecdfb65a60" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--4qxgx-eth0" Dec 13 02:11:41.029837 env[1220]: 2024-12-13 02:11:40.943 [INFO][3915] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b9048da2eacd9d23c945c28b520aa124c132a8792f6c668d7314d9ecdfb65a60" HandleID="k8s-pod-network.b9048da2eacd9d23c945c28b520aa124c132a8792f6c668d7314d9ecdfb65a60" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--4qxgx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000309170), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal", "pod":"coredns-6f6b679f8f-4qxgx", "timestamp":"2024-12-13 02:11:40.925139135 +0000 UTC"}, Hostname:"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:11:41.029837 env[1220]: 2024-12-13 02:11:40.943 [INFO][3915] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:11:41.029837 env[1220]: 2024-12-13 02:11:40.943 [INFO][3915] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:11:41.029837 env[1220]: 2024-12-13 02:11:40.943 [INFO][3915] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal' Dec 13 02:11:41.029837 env[1220]: 2024-12-13 02:11:40.946 [INFO][3915] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b9048da2eacd9d23c945c28b520aa124c132a8792f6c668d7314d9ecdfb65a60" host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:41.029837 env[1220]: 2024-12-13 02:11:40.951 [INFO][3915] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:41.029837 env[1220]: 2024-12-13 02:11:40.957 [INFO][3915] ipam/ipam.go 489: Trying affinity for 192.168.99.0/26 host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:41.029837 env[1220]: 2024-12-13 02:11:40.959 [INFO][3915] ipam/ipam.go 155: Attempting to load block cidr=192.168.99.0/26 host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:41.029837 env[1220]: 2024-12-13 02:11:40.963 [INFO][3915] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.99.0/26 host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:41.029837 env[1220]: 2024-12-13 02:11:40.963 [INFO][3915] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.99.0/26 handle="k8s-pod-network.b9048da2eacd9d23c945c28b520aa124c132a8792f6c668d7314d9ecdfb65a60" host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:41.029837 env[1220]: 2024-12-13 02:11:40.965 [INFO][3915] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.b9048da2eacd9d23c945c28b520aa124c132a8792f6c668d7314d9ecdfb65a60 Dec 13 02:11:41.029837 env[1220]: 2024-12-13 02:11:40.972 [INFO][3915] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.99.0/26 handle="k8s-pod-network.b9048da2eacd9d23c945c28b520aa124c132a8792f6c668d7314d9ecdfb65a60" host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:41.029837 env[1220]: 2024-12-13 02:11:40.983 [INFO][3915] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.99.6/26] block=192.168.99.0/26 handle="k8s-pod-network.b9048da2eacd9d23c945c28b520aa124c132a8792f6c668d7314d9ecdfb65a60" host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:41.029837 env[1220]: 2024-12-13 02:11:40.983 [INFO][3915] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.99.6/26] handle="k8s-pod-network.b9048da2eacd9d23c945c28b520aa124c132a8792f6c668d7314d9ecdfb65a60" host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:41.029837 env[1220]: 2024-12-13 02:11:40.983 [INFO][3915] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:11:41.029837 env[1220]: 2024-12-13 02:11:40.983 [INFO][3915] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.99.6/26] IPv6=[] ContainerID="b9048da2eacd9d23c945c28b520aa124c132a8792f6c668d7314d9ecdfb65a60" HandleID="k8s-pod-network.b9048da2eacd9d23c945c28b520aa124c132a8792f6c668d7314d9ecdfb65a60" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--4qxgx-eth0" Dec 13 02:11:41.031252 env[1220]: 2024-12-13 02:11:40.985 [INFO][3903] cni-plugin/k8s.go 386: Populated endpoint ContainerID="b9048da2eacd9d23c945c28b520aa124c132a8792f6c668d7314d9ecdfb65a60" Namespace="kube-system" Pod="coredns-6f6b679f8f-4qxgx" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--4qxgx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--4qxgx-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"38e5368d-879b-4625-afd4-c27aa522644e", ResourceVersion:"855", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 11, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal", ContainerID:"", Pod:"coredns-6f6b679f8f-4qxgx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.99.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4fb333717a5", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:11:41.031252 env[1220]: 2024-12-13 02:11:40.986 [INFO][3903] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.99.6/32] ContainerID="b9048da2eacd9d23c945c28b520aa124c132a8792f6c668d7314d9ecdfb65a60" Namespace="kube-system" Pod="coredns-6f6b679f8f-4qxgx" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--4qxgx-eth0" Dec 13 02:11:41.031252 env[1220]: 2024-12-13 02:11:40.986 [INFO][3903] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali4fb333717a5 ContainerID="b9048da2eacd9d23c945c28b520aa124c132a8792f6c668d7314d9ecdfb65a60" Namespace="kube-system" Pod="coredns-6f6b679f8f-4qxgx" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--4qxgx-eth0" Dec 13 02:11:41.031252 env[1220]: 2024-12-13 02:11:41.006 [INFO][3903] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b9048da2eacd9d23c945c28b520aa124c132a8792f6c668d7314d9ecdfb65a60" Namespace="kube-system" Pod="coredns-6f6b679f8f-4qxgx" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--4qxgx-eth0" Dec 13 02:11:41.031252 env[1220]: 2024-12-13 02:11:41.006 [INFO][3903] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="b9048da2eacd9d23c945c28b520aa124c132a8792f6c668d7314d9ecdfb65a60" Namespace="kube-system" Pod="coredns-6f6b679f8f-4qxgx" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--4qxgx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--4qxgx-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"38e5368d-879b-4625-afd4-c27aa522644e", ResourceVersion:"855", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 11, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal", ContainerID:"b9048da2eacd9d23c945c28b520aa124c132a8792f6c668d7314d9ecdfb65a60", Pod:"coredns-6f6b679f8f-4qxgx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.99.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4fb333717a5", MAC:"de:ef:a1:5a:b0:c4", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:11:41.031252 env[1220]: 2024-12-13 02:11:41.021 [INFO][3903] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="b9048da2eacd9d23c945c28b520aa124c132a8792f6c668d7314d9ecdfb65a60" Namespace="kube-system" Pod="coredns-6f6b679f8f-4qxgx" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--4qxgx-eth0" Dec 13 02:11:41.067401 env[1220]: time="2024-12-13T02:11:41.067295176Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:11:41.067648 env[1220]: time="2024-12-13T02:11:41.067428168Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:11:41.067648 env[1220]: time="2024-12-13T02:11:41.067471564Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:11:41.067838 env[1220]: time="2024-12-13T02:11:41.067785685Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b9048da2eacd9d23c945c28b520aa124c132a8792f6c668d7314d9ecdfb65a60 pid=3941 runtime=io.containerd.runc.v2 Dec 13 02:11:41.092000 audit[3950]: NETFILTER_CFG table=filter:110 family=2 entries=46 op=nft_register_chain pid=3950 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:11:41.092000 audit[3950]: SYSCALL arch=c000003e syscall=46 success=yes exit=21784 a0=3 a1=7ffd17d02a80 a2=0 a3=7ffd17d02a6c items=0 ppid=3152 pid=3950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:41.092000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:11:41.120754 systemd[1]: Started cri-containerd-b9048da2eacd9d23c945c28b520aa124c132a8792f6c668d7314d9ecdfb65a60.scope. Dec 13 02:11:41.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.156000 audit: BPF prog-id=191 op=LOAD Dec 13 02:11:41.156000 audit[3951]: AVC avc: denied { bpf } for pid=3951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.156000 audit[3951]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3941 pid=3951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:41.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239303438646132656163643964323363393435633238623532306161 Dec 13 02:11:41.156000 audit[3951]: AVC avc: denied { perfmon } for pid=3951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.156000 audit[3951]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3941 pid=3951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:41.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239303438646132656163643964323363393435633238623532306161 Dec 13 02:11:41.157000 audit[3951]: AVC avc: denied { bpf } for pid=3951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.157000 audit[3951]: AVC avc: denied { bpf } for pid=3951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.157000 audit[3951]: AVC avc: denied { bpf } for pid=3951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.157000 audit[3951]: AVC avc: denied { perfmon } for pid=3951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.157000 audit[3951]: AVC avc: denied { perfmon } for pid=3951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.157000 audit[3951]: AVC avc: denied { perfmon } for pid=3951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.157000 audit[3951]: AVC avc: denied { perfmon } for pid=3951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.157000 audit[3951]: AVC avc: denied { perfmon } for pid=3951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.157000 audit[3951]: AVC avc: denied { bpf } for pid=3951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.157000 audit[3951]: AVC avc: denied { bpf } for pid=3951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.157000 audit: BPF prog-id=192 op=LOAD Dec 13 02:11:41.157000 audit[3951]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a8350 items=0 ppid=3941 pid=3951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:41.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239303438646132656163643964323363393435633238623532306161 Dec 13 02:11:41.157000 audit[3951]: AVC avc: denied { bpf } for pid=3951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.157000 audit[3951]: AVC avc: denied { bpf } for pid=3951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.157000 audit[3951]: AVC avc: denied { perfmon } for pid=3951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.157000 audit[3951]: AVC avc: denied { perfmon } for pid=3951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.157000 audit[3951]: AVC avc: denied { perfmon } for pid=3951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.157000 audit[3951]: AVC avc: denied { perfmon } for pid=3951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.157000 audit[3951]: AVC avc: denied { perfmon } for pid=3951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.157000 audit[3951]: AVC avc: denied { bpf } for pid=3951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.157000 audit[3951]: AVC avc: denied { bpf } for pid=3951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.157000 audit: BPF prog-id=193 op=LOAD Dec 13 02:11:41.157000 audit[3951]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000a8398 items=0 ppid=3941 pid=3951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:41.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239303438646132656163643964323363393435633238623532306161 Dec 13 02:11:41.157000 audit: BPF prog-id=193 op=UNLOAD Dec 13 02:11:41.157000 audit: BPF prog-id=192 op=UNLOAD Dec 13 02:11:41.157000 audit[3951]: AVC avc: denied { bpf } for pid=3951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.157000 audit[3951]: AVC avc: denied { bpf } for pid=3951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.157000 audit[3951]: AVC avc: denied { bpf } for pid=3951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.157000 audit[3951]: AVC avc: denied { perfmon } for pid=3951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.157000 audit[3951]: AVC avc: denied { perfmon } for pid=3951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.157000 audit[3951]: AVC avc: denied { perfmon } for pid=3951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.157000 audit[3951]: AVC avc: denied { perfmon } for pid=3951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.157000 audit[3951]: AVC avc: denied { perfmon } for pid=3951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.157000 audit[3951]: AVC avc: denied { bpf } for pid=3951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.157000 audit[3951]: AVC avc: denied { bpf } for pid=3951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.157000 audit: BPF prog-id=194 op=LOAD Dec 13 02:11:41.157000 audit[3951]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000a87a8 items=0 ppid=3941 pid=3951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:41.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239303438646132656163643964323363393435633238623532306161 Dec 13 02:11:41.210230 env[1220]: time="2024-12-13T02:11:41.210174429Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-4qxgx,Uid:38e5368d-879b-4625-afd4-c27aa522644e,Namespace:kube-system,Attempt:1,} returns sandbox id \"b9048da2eacd9d23c945c28b520aa124c132a8792f6c668d7314d9ecdfb65a60\"" Dec 13 02:11:41.215024 env[1220]: time="2024-12-13T02:11:41.214972072Z" level=info msg="CreateContainer within sandbox \"b9048da2eacd9d23c945c28b520aa124c132a8792f6c668d7314d9ecdfb65a60\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 02:11:41.246806 env[1220]: time="2024-12-13T02:11:41.246742498Z" level=info msg="CreateContainer within sandbox \"b9048da2eacd9d23c945c28b520aa124c132a8792f6c668d7314d9ecdfb65a60\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"76505561f4ae241373017589570bd1342cc4caee0e511b92454d9d33418730a9\"" Dec 13 02:11:41.248852 env[1220]: time="2024-12-13T02:11:41.248807860Z" level=info msg="StartContainer for \"76505561f4ae241373017589570bd1342cc4caee0e511b92454d9d33418730a9\"" Dec 13 02:11:41.296003 systemd[1]: Started cri-containerd-76505561f4ae241373017589570bd1342cc4caee0e511b92454d9d33418730a9.scope. Dec 13 02:11:41.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.332000 audit: BPF prog-id=195 op=LOAD Dec 13 02:11:41.334000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.334000 audit[3981]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3941 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:41.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736353035353631663461653234313337333031373538393537306264 Dec 13 02:11:41.336000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.336000 audit[3981]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3941 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:41.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736353035353631663461653234313337333031373538393537306264 Dec 13 02:11:41.336000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.336000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.336000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.336000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.336000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.336000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.336000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.336000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.336000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.336000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.336000 audit: BPF prog-id=196 op=LOAD Dec 13 02:11:41.336000 audit[3981]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000244d0 items=0 ppid=3941 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:41.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736353035353631663461653234313337333031373538393537306264 Dec 13 02:11:41.338000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.338000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.338000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.338000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.338000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.338000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.338000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.338000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.338000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.338000 audit: BPF prog-id=197 op=LOAD Dec 13 02:11:41.338000 audit[3981]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000024518 items=0 ppid=3941 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:41.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736353035353631663461653234313337333031373538393537306264 Dec 13 02:11:41.339000 audit: BPF prog-id=197 op=UNLOAD Dec 13 02:11:41.339000 audit: BPF prog-id=196 op=UNLOAD Dec 13 02:11:41.339000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.339000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.339000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.339000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.339000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.339000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.339000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.339000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.339000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.339000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.339000 audit: BPF prog-id=198 op=LOAD Dec 13 02:11:41.339000 audit[3981]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000024928 items=0 ppid=3941 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:41.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736353035353631663461653234313337333031373538393537306264 Dec 13 02:11:41.368981 env[1220]: time="2024-12-13T02:11:41.368923217Z" level=info msg="StartContainer for \"76505561f4ae241373017589570bd1342cc4caee0e511b92454d9d33418730a9\" returns successfully" Dec 13 02:11:41.758757 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4192641204.mount: Deactivated successfully. Dec 13 02:11:41.809365 env[1220]: time="2024-12-13T02:11:41.809305534Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:11:41.812977 env[1220]: time="2024-12-13T02:11:41.812627007Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:11:41.817734 env[1220]: time="2024-12-13T02:11:41.817682938Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:11:41.819694 env[1220]: time="2024-12-13T02:11:41.819643543Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:11:41.823035 env[1220]: time="2024-12-13T02:11:41.822982297Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 02:11:41.830597 env[1220]: time="2024-12-13T02:11:41.828904256Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 02:11:41.832651 env[1220]: time="2024-12-13T02:11:41.830914914Z" level=info msg="CreateContainer within sandbox \"a6d3681dd35197138d7e5db2e03fc4add16132fb07942cce53c7f456dfa7a292\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 02:11:41.858707 kubelet[2032]: I1213 02:11:41.858624 2032 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-4qxgx" podStartSLOduration=40.858599996 podStartE2EDuration="40.858599996s" podCreationTimestamp="2024-12-13 02:11:01 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:11:41.839919116 +0000 UTC m=+48.438389537" watchObservedRunningTime="2024-12-13 02:11:41.858599996 +0000 UTC m=+48.457070403" Dec 13 02:11:41.867526 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount39684258.mount: Deactivated successfully. Dec 13 02:11:41.878114 env[1220]: time="2024-12-13T02:11:41.878050361Z" level=info msg="CreateContainer within sandbox \"a6d3681dd35197138d7e5db2e03fc4add16132fb07942cce53c7f456dfa7a292\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"aaec64d35be28c1c04524621a2f447e4224ae5983f42e301454047b57799fdb5\"" Dec 13 02:11:41.880469 env[1220]: time="2024-12-13T02:11:41.880410066Z" level=info msg="StartContainer for \"aaec64d35be28c1c04524621a2f447e4224ae5983f42e301454047b57799fdb5\"" Dec 13 02:11:41.925269 systemd[1]: Started cri-containerd-aaec64d35be28c1c04524621a2f447e4224ae5983f42e301454047b57799fdb5.scope. Dec 13 02:11:41.955000 audit[4030]: NETFILTER_CFG table=filter:111 family=2 entries=10 op=nft_register_rule pid=4030 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:11:41.955000 audit[4030]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd0f85e8c0 a2=0 a3=7ffd0f85e8ac items=0 ppid=2179 pid=4030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:41.955000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:11:41.962000 audit[4030]: NETFILTER_CFG table=nat:112 family=2 entries=44 op=nft_register_rule pid=4030 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:11:41.962000 audit[4030]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd0f85e8c0 a2=0 a3=7ffd0f85e8ac items=0 ppid=2179 pid=4030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:41.962000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:11:41.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.984000 audit: BPF prog-id=199 op=LOAD Dec 13 02:11:41.985000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.985000 audit[4021]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3670 pid=4021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:41.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161656336346433356265323863316330343532343632316132663434 Dec 13 02:11:41.985000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.985000 audit[4021]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3670 pid=4021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:41.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161656336346433356265323863316330343532343632316132663434 Dec 13 02:11:41.985000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.985000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.985000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.985000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.985000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.985000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.985000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.985000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.985000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.985000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.985000 audit: BPF prog-id=200 op=LOAD Dec 13 02:11:41.985000 audit[4021]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003ca980 items=0 ppid=3670 pid=4021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:41.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161656336346433356265323863316330343532343632316132663434 Dec 13 02:11:41.985000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.985000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.985000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.985000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.985000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.985000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.985000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.985000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.985000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.985000 audit: BPF prog-id=201 op=LOAD Dec 13 02:11:41.985000 audit[4021]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003ca9c8 items=0 ppid=3670 pid=4021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:41.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161656336346433356265323863316330343532343632316132663434 Dec 13 02:11:41.985000 audit: BPF prog-id=201 op=UNLOAD Dec 13 02:11:41.985000 audit: BPF prog-id=200 op=UNLOAD Dec 13 02:11:41.985000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.985000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.985000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.985000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.985000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.985000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.985000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.985000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.985000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.985000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:41.985000 audit: BPF prog-id=202 op=LOAD Dec 13 02:11:41.985000 audit[4021]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003cadd8 items=0 ppid=3670 pid=4021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:41.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161656336346433356265323863316330343532343632316132663434 Dec 13 02:11:41.990000 audit[4039]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=4039 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:11:41.990000 audit[4039]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffecb9b5380 a2=0 a3=7ffecb9b536c items=0 ppid=2179 pid=4039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:41.990000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:11:42.007000 audit[4039]: NETFILTER_CFG table=nat:114 family=2 entries=56 op=nft_register_chain pid=4039 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:11:42.007000 audit[4039]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffecb9b5380 a2=0 a3=7ffecb9b536c items=0 ppid=2179 pid=4039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:42.007000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:11:42.041227 env[1220]: time="2024-12-13T02:11:42.037949335Z" level=info msg="StartContainer for \"aaec64d35be28c1c04524621a2f447e4224ae5983f42e301454047b57799fdb5\" returns successfully" Dec 13 02:11:42.366906 systemd-networkd[1019]: cali4fb333717a5: Gained IPv6LL Dec 13 02:11:42.757414 systemd[1]: run-containerd-runc-k8s.io-aaec64d35be28c1c04524621a2f447e4224ae5983f42e301454047b57799fdb5-runc.nZhybi.mount: Deactivated successfully. Dec 13 02:11:42.835097 kubelet[2032]: I1213 02:11:42.835053 2032 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:11:42.936412 systemd[1]: run-containerd-runc-k8s.io-57d503df536c00d49fcd26d2d9f0d3c259ab11bcc5b0ac34badd5f03d9a3785f-runc.yXbxek.mount: Deactivated successfully. Dec 13 02:11:43.076000 audit[4076]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4076 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:11:43.076000 audit[4076]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffebc353db0 a2=0 a3=7ffebc353d9c items=0 ppid=2179 pid=4076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:43.076000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:11:43.083000 audit[4076]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4076 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:11:43.083000 audit[4076]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffebc353db0 a2=0 a3=7ffebc353d9c items=0 ppid=2179 pid=4076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:43.083000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:11:43.215834 kubelet[2032]: I1213 02:11:43.215329 2032 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7589d484d8-t9c25" podStartSLOduration=27.395190301 podStartE2EDuration="30.21530036s" podCreationTimestamp="2024-12-13 02:11:13 +0000 UTC" firstStartedPulling="2024-12-13 02:11:39.007063445 +0000 UTC m=+45.605533832" lastFinishedPulling="2024-12-13 02:11:41.827173487 +0000 UTC m=+48.425643891" observedRunningTime="2024-12-13 02:11:42.859859967 +0000 UTC m=+49.458330375" watchObservedRunningTime="2024-12-13 02:11:43.21530036 +0000 UTC m=+49.813770772" Dec 13 02:11:43.268757 systemd[1]: run-containerd-runc-k8s.io-57d503df536c00d49fcd26d2d9f0d3c259ab11bcc5b0ac34badd5f03d9a3785f-runc.jcvqmV.mount: Deactivated successfully. Dec 13 02:11:43.831009 kubelet[2032]: I1213 02:11:43.830970 2032 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:11:44.289996 kernel: kauditd_printk_skb: 434 callbacks suppressed Dec 13 02:11:44.290186 kernel: audit: type=1400 audit(1734055904.254:1191): avc: denied { watch } for pid=4032 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_11_23.3242189021/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c555,c853 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c555,c853 tclass=file permissive=0 Dec 13 02:11:44.254000 audit[4032]: AVC avc: denied { watch } for pid=4032 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_11_23.3242189021/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c555,c853 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c555,c853 tclass=file permissive=0 Dec 13 02:11:44.254000 audit[4032]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000a20be0 a2=fc6 a3=0 items=0 ppid=3670 pid=4032 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c555,c853 key=(null) Dec 13 02:11:44.337610 kernel: audit: type=1300 audit(1734055904.254:1191): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000a20be0 a2=fc6 a3=0 items=0 ppid=3670 pid=4032 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c555,c853 key=(null) Dec 13 02:11:44.254000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:11:44.379620 kernel: audit: type=1327 audit(1734055904.254:1191): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:11:44.554598 env[1220]: time="2024-12-13T02:11:44.554427762Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:11:44.557591 env[1220]: time="2024-12-13T02:11:44.557503304Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:11:44.559665 env[1220]: time="2024-12-13T02:11:44.559627495Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:11:44.561906 env[1220]: time="2024-12-13T02:11:44.561869018Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:11:44.562601 env[1220]: time="2024-12-13T02:11:44.562541809Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 02:11:44.565201 env[1220]: time="2024-12-13T02:11:44.565147337Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 02:11:44.588329 env[1220]: time="2024-12-13T02:11:44.588269424Z" level=info msg="CreateContainer within sandbox \"87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 02:11:44.611620 env[1220]: time="2024-12-13T02:11:44.611534131Z" level=info msg="CreateContainer within sandbox \"87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"3828e015e9131383d7316db205f2c6bc3463c58182ec730597a6213154ef47e0\"" Dec 13 02:11:44.612990 env[1220]: time="2024-12-13T02:11:44.612910701Z" level=info msg="StartContainer for \"3828e015e9131383d7316db205f2c6bc3463c58182ec730597a6213154ef47e0\"" Dec 13 02:11:44.653581 systemd[1]: Started cri-containerd-3828e015e9131383d7316db205f2c6bc3463c58182ec730597a6213154ef47e0.scope. Dec 13 02:11:44.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.698885 kernel: audit: type=1400 audit(1734055904.675:1192): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.728339 kernel: audit: type=1400 audit(1734055904.675:1193): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.749595 kernel: audit: type=1400 audit(1734055904.675:1194): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.771606 kernel: audit: type=1400 audit(1734055904.675:1195): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.771762 kernel: audit: type=1400 audit(1734055904.675:1196): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.791106 env[1220]: time="2024-12-13T02:11:44.791041979Z" level=info msg="StartContainer for \"3828e015e9131383d7316db205f2c6bc3463c58182ec730597a6213154ef47e0\" returns successfully" Dec 13 02:11:44.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.816656 kernel: audit: type=1400 audit(1734055904.675:1197): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.819596 env[1220]: time="2024-12-13T02:11:44.818212018Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:11:44.822171 env[1220]: time="2024-12-13T02:11:44.822120759Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:11:44.825684 env[1220]: time="2024-12-13T02:11:44.825636411Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:11:44.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.848740 kernel: audit: type=1400 audit(1734055904.675:1198): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.848803 env[1220]: time="2024-12-13T02:11:44.828876067Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:11:44.848803 env[1220]: time="2024-12-13T02:11:44.830006602Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 02:11:44.848803 env[1220]: time="2024-12-13T02:11:44.847858689Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 02:11:44.850642 env[1220]: time="2024-12-13T02:11:44.850588476Z" level=info msg="CreateContainer within sandbox \"d9bc1e46ff3d4dce38ec8356146a5b75698e7229100f2e8e8ba76946092befff\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 02:11:44.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.696000 audit: BPF prog-id=203 op=LOAD Dec 13 02:11:44.697000 audit[4110]: AVC avc: denied { bpf } for pid=4110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.697000 audit[4110]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3707 pid=4110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:44.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338323865303135653931333133383364373331366462323035663263 Dec 13 02:11:44.697000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.697000 audit[4110]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3707 pid=4110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:44.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338323865303135653931333133383364373331366462323035663263 Dec 13 02:11:44.697000 audit[4110]: AVC avc: denied { bpf } for pid=4110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.697000 audit[4110]: AVC avc: denied { bpf } for pid=4110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.697000 audit[4110]: AVC avc: denied { bpf } for pid=4110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.697000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.697000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.697000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.697000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.697000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.697000 audit[4110]: AVC avc: denied { bpf } for pid=4110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.697000 audit[4110]: AVC avc: denied { bpf } for pid=4110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.697000 audit: BPF prog-id=204 op=LOAD Dec 13 02:11:44.697000 audit[4110]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000218380 items=0 ppid=3707 pid=4110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:44.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338323865303135653931333133383364373331366462323035663263 Dec 13 02:11:44.698000 audit[4110]: AVC avc: denied { bpf } for pid=4110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.698000 audit[4110]: AVC avc: denied { bpf } for pid=4110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.698000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.698000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.698000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.698000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.698000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.698000 audit[4110]: AVC avc: denied { bpf } for pid=4110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.698000 audit[4110]: AVC avc: denied { bpf } for pid=4110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.698000 audit: BPF prog-id=205 op=LOAD Dec 13 02:11:44.698000 audit[4110]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002183c8 items=0 ppid=3707 pid=4110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:44.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338323865303135653931333133383364373331366462323035663263 Dec 13 02:11:44.698000 audit: BPF prog-id=205 op=UNLOAD Dec 13 02:11:44.698000 audit: BPF prog-id=204 op=UNLOAD Dec 13 02:11:44.698000 audit[4110]: AVC avc: denied { bpf } for pid=4110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.698000 audit[4110]: AVC avc: denied { bpf } for pid=4110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.698000 audit[4110]: AVC avc: denied { bpf } for pid=4110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.698000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.698000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.698000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.698000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.698000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.698000 audit[4110]: AVC avc: denied { bpf } for pid=4110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.698000 audit[4110]: AVC avc: denied { bpf } for pid=4110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:44.698000 audit: BPF prog-id=206 op=LOAD Dec 13 02:11:44.698000 audit[4110]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002187d8 items=0 ppid=3707 pid=4110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:44.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338323865303135653931333133383364373331366462323035663263 Dec 13 02:11:44.878383 env[1220]: time="2024-12-13T02:11:44.876727915Z" level=info msg="CreateContainer within sandbox \"d9bc1e46ff3d4dce38ec8356146a5b75698e7229100f2e8e8ba76946092befff\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"a2aaee3fff8bc4f80806e305c48f966ae8c6b01192f0160759e96d0048595889\"" Dec 13 02:11:44.878480 env[1220]: time="2024-12-13T02:11:44.878382530Z" level=info msg="StartContainer for \"a2aaee3fff8bc4f80806e305c48f966ae8c6b01192f0160759e96d0048595889\"" Dec 13 02:11:44.886135 kubelet[2032]: I1213 02:11:44.886050 2032 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-665858c48b-kkf7t" podStartSLOduration=27.499659355 podStartE2EDuration="32.886002713s" podCreationTimestamp="2024-12-13 02:11:12 +0000 UTC" firstStartedPulling="2024-12-13 02:11:39.177645308 +0000 UTC m=+45.776115709" lastFinishedPulling="2024-12-13 02:11:44.563988685 +0000 UTC m=+51.162459067" observedRunningTime="2024-12-13 02:11:44.885125129 +0000 UTC m=+51.483595537" watchObservedRunningTime="2024-12-13 02:11:44.886002713 +0000 UTC m=+51.484473118" Dec 13 02:11:44.960233 systemd[1]: Started cri-containerd-a2aaee3fff8bc4f80806e305c48f966ae8c6b01192f0160759e96d0048595889.scope. Dec 13 02:11:45.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:45.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:45.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:45.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:45.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:45.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:45.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:45.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:45.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:45.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:45.017000 audit: BPF prog-id=207 op=LOAD Dec 13 02:11:45.019000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:45.019000 audit[4162]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3767 pid=4162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:45.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132616165653366666638626334663830383036653330356334386639 Dec 13 02:11:45.020000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:45.020000 audit[4162]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3767 pid=4162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:45.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132616165653366666638626334663830383036653330356334386639 Dec 13 02:11:45.020000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:45.020000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:45.020000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:45.020000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:45.020000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:45.020000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:45.020000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:45.020000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:45.020000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:45.020000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:45.020000 audit: BPF prog-id=208 op=LOAD Dec 13 02:11:45.020000 audit[4162]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000dfd00 items=0 ppid=3767 pid=4162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:45.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132616165653366666638626334663830383036653330356334386639 Dec 13 02:11:45.022000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:45.022000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:45.022000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:45.022000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:45.022000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:45.022000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:45.022000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:45.022000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:45.022000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:45.022000 audit: BPF prog-id=209 op=LOAD Dec 13 02:11:45.022000 audit[4162]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000dfd48 items=0 ppid=3767 pid=4162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:45.022000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132616165653366666638626334663830383036653330356334386639 Dec 13 02:11:45.024000 audit: BPF prog-id=209 op=UNLOAD Dec 13 02:11:45.024000 audit: BPF prog-id=208 op=UNLOAD Dec 13 02:11:45.024000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:45.024000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:45.024000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:45.024000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:45.024000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:45.024000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:45.024000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:45.024000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:45.024000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:45.024000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:45.024000 audit: BPF prog-id=210 op=LOAD Dec 13 02:11:45.024000 audit[4162]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00034a158 items=0 ppid=3767 pid=4162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:45.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132616165653366666638626334663830383036653330356334386639 Dec 13 02:11:45.163255 env[1220]: time="2024-12-13T02:11:45.163097118Z" level=info msg="StartContainer for \"a2aaee3fff8bc4f80806e305c48f966ae8c6b01192f0160759e96d0048595889\" returns successfully" Dec 13 02:11:45.919000 audit[4206]: NETFILTER_CFG table=filter:117 family=2 entries=10 op=nft_register_rule pid=4206 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:11:45.919000 audit[4206]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffea6e3f390 a2=0 a3=7ffea6e3f37c items=0 ppid=2179 pid=4206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:45.919000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:11:45.928000 audit[4206]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=4206 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:11:45.928000 audit[4206]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffea6e3f390 a2=0 a3=7ffea6e3f37c items=0 ppid=2179 pid=4206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:45.928000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:11:46.046466 env[1220]: time="2024-12-13T02:11:46.046411303Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:11:46.050705 env[1220]: time="2024-12-13T02:11:46.050660827Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:11:46.054333 env[1220]: time="2024-12-13T02:11:46.054293923Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:11:46.058182 env[1220]: time="2024-12-13T02:11:46.058109011Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:11:46.059715 env[1220]: time="2024-12-13T02:11:46.059663447Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 02:11:46.065762 env[1220]: time="2024-12-13T02:11:46.065717765Z" level=info msg="CreateContainer within sandbox \"37042aafd5c0db236d15b8634e07996609f39f98acb2bfd95aba16f3b181349c\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 02:11:46.106351 env[1220]: time="2024-12-13T02:11:46.106283760Z" level=info msg="CreateContainer within sandbox \"37042aafd5c0db236d15b8634e07996609f39f98acb2bfd95aba16f3b181349c\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"2a2ce05c87b46f84f44e60fb01cc7ae9b74eaf6118004c7c6b45952d94654713\"" Dec 13 02:11:46.109884 env[1220]: time="2024-12-13T02:11:46.109824173Z" level=info msg="StartContainer for \"2a2ce05c87b46f84f44e60fb01cc7ae9b74eaf6118004c7c6b45952d94654713\"" Dec 13 02:11:46.115678 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3938555179.mount: Deactivated successfully. Dec 13 02:11:46.179751 systemd[1]: Started cri-containerd-2a2ce05c87b46f84f44e60fb01cc7ae9b74eaf6118004c7c6b45952d94654713.scope. Dec 13 02:11:46.241000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:46.241000 audit[4214]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fe86a2e3018 items=0 ppid=3827 pid=4214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:46.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261326365303563383762343666383466343465363066623031636337 Dec 13 02:11:46.242000 audit[4214]: AVC avc: denied { bpf } for pid=4214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:46.242000 audit[4214]: AVC avc: denied { bpf } for pid=4214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:46.242000 audit[4214]: AVC avc: denied { bpf } for pid=4214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:46.242000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:46.242000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:46.242000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:46.242000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:46.242000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:46.242000 audit[4214]: AVC avc: denied { bpf } for pid=4214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:46.242000 audit[4214]: AVC avc: denied { bpf } for pid=4214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:46.242000 audit: BPF prog-id=211 op=LOAD Dec 13 02:11:46.242000 audit[4214]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003d4818 items=0 ppid=3827 pid=4214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:46.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261326365303563383762343666383466343465363066623031636337 Dec 13 02:11:46.242000 audit[4214]: AVC avc: denied { bpf } for pid=4214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:46.242000 audit[4214]: AVC avc: denied { bpf } for pid=4214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:46.242000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:46.242000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:46.242000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:46.242000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:46.242000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:46.242000 audit[4214]: AVC avc: denied { bpf } for pid=4214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:46.242000 audit[4214]: AVC avc: denied { bpf } for pid=4214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:46.242000 audit: BPF prog-id=212 op=LOAD Dec 13 02:11:46.242000 audit[4214]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003d4868 items=0 ppid=3827 pid=4214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:46.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261326365303563383762343666383466343465363066623031636337 Dec 13 02:11:46.242000 audit: BPF prog-id=212 op=UNLOAD Dec 13 02:11:46.242000 audit: BPF prog-id=211 op=UNLOAD Dec 13 02:11:46.242000 audit[4214]: AVC avc: denied { bpf } for pid=4214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:46.242000 audit[4214]: AVC avc: denied { bpf } for pid=4214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:46.242000 audit[4214]: AVC avc: denied { bpf } for pid=4214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:46.242000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:46.242000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:46.242000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:46.242000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:46.242000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:46.242000 audit[4214]: AVC avc: denied { bpf } for pid=4214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:46.242000 audit[4214]: AVC avc: denied { bpf } for pid=4214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:46.242000 audit: BPF prog-id=213 op=LOAD Dec 13 02:11:46.242000 audit[4214]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003d48f8 items=0 ppid=3827 pid=4214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:46.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261326365303563383762343666383466343465363066623031636337 Dec 13 02:11:46.271797 env[1220]: time="2024-12-13T02:11:46.271648231Z" level=info msg="StartContainer for \"2a2ce05c87b46f84f44e60fb01cc7ae9b74eaf6118004c7c6b45952d94654713\" returns successfully" Dec 13 02:11:46.277105 env[1220]: time="2024-12-13T02:11:46.277032370Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 02:11:46.847523 kubelet[2032]: I1213 02:11:46.847487 2032 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:11:47.599255 env[1220]: time="2024-12-13T02:11:47.599197694Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:11:47.602711 env[1220]: time="2024-12-13T02:11:47.602661656Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:11:47.604524 env[1220]: time="2024-12-13T02:11:47.604469773Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:11:47.607589 env[1220]: time="2024-12-13T02:11:47.607511975Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 02:11:47.609084 env[1220]: time="2024-12-13T02:11:47.609031136Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:11:47.615626 env[1220]: time="2024-12-13T02:11:47.615581056Z" level=info msg="CreateContainer within sandbox \"37042aafd5c0db236d15b8634e07996609f39f98acb2bfd95aba16f3b181349c\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 02:11:47.645608 env[1220]: time="2024-12-13T02:11:47.645527581Z" level=info msg="CreateContainer within sandbox \"37042aafd5c0db236d15b8634e07996609f39f98acb2bfd95aba16f3b181349c\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"44adc14c21c0483a5e600a481f82554e1f5f6814dcad34e79d52a0634096a566\"" Dec 13 02:11:47.647204 env[1220]: time="2024-12-13T02:11:47.647158657Z" level=info msg="StartContainer for \"44adc14c21c0483a5e600a481f82554e1f5f6814dcad34e79d52a0634096a566\"" Dec 13 02:11:47.708831 systemd[1]: Started cri-containerd-44adc14c21c0483a5e600a481f82554e1f5f6814dcad34e79d52a0634096a566.scope. Dec 13 02:11:47.749000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:47.749000 audit[4250]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7fee1ca2cb98 items=0 ppid=3827 pid=4250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:47.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434616463313463323163303438336135653630306134383166383235 Dec 13 02:11:47.749000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:47.749000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:47.749000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:47.749000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:47.749000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:47.749000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:47.749000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:47.749000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:47.749000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:47.749000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:47.749000 audit: BPF prog-id=214 op=LOAD Dec 13 02:11:47.749000 audit[4250]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0001fe298 items=0 ppid=3827 pid=4250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:47.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434616463313463323163303438336135653630306134383166383235 Dec 13 02:11:47.750000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:47.750000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:47.750000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:47.750000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:47.750000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:47.750000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:47.750000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:47.750000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:47.750000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:47.750000 audit: BPF prog-id=215 op=LOAD Dec 13 02:11:47.750000 audit[4250]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0001fe2e8 items=0 ppid=3827 pid=4250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:47.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434616463313463323163303438336135653630306134383166383235 Dec 13 02:11:47.750000 audit: BPF prog-id=215 op=UNLOAD Dec 13 02:11:47.750000 audit: BPF prog-id=214 op=UNLOAD Dec 13 02:11:47.750000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:47.750000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:47.750000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:47.750000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:47.750000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:47.750000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:47.750000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:47.750000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:47.750000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:47.750000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:47.750000 audit: BPF prog-id=216 op=LOAD Dec 13 02:11:47.750000 audit[4250]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0001fe378 items=0 ppid=3827 pid=4250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:47.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434616463313463323163303438336135653630306134383166383235 Dec 13 02:11:47.783188 env[1220]: time="2024-12-13T02:11:47.783134797Z" level=info msg="StartContainer for \"44adc14c21c0483a5e600a481f82554e1f5f6814dcad34e79d52a0634096a566\" returns successfully" Dec 13 02:11:47.872834 kubelet[2032]: I1213 02:11:47.872654 2032 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7589d484d8-nbqzv" podStartSLOduration=29.287657825 podStartE2EDuration="34.872627289s" podCreationTimestamp="2024-12-13 02:11:13 +0000 UTC" firstStartedPulling="2024-12-13 02:11:39.261428688 +0000 UTC m=+45.859899077" lastFinishedPulling="2024-12-13 02:11:44.846398141 +0000 UTC m=+51.444868541" observedRunningTime="2024-12-13 02:11:45.866886336 +0000 UTC m=+52.465356742" watchObservedRunningTime="2024-12-13 02:11:47.872627289 +0000 UTC m=+54.471097710" Dec 13 02:11:47.899000 audit[4181]: AVC avc: denied { watch } for pid=4181 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_11_23.1859003455/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c119,c663 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c119,c663 tclass=file permissive=0 Dec 13 02:11:47.899000 audit[4181]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000930540 a2=fc6 a3=0 items=0 ppid=3767 pid=4181 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c119,c663 key=(null) Dec 13 02:11:47.899000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:11:48.525417 kubelet[2032]: I1213 02:11:48.525291 2032 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-8brk9" podStartSLOduration=28.215697566 podStartE2EDuration="36.525262991s" podCreationTimestamp="2024-12-13 02:11:12 +0000 UTC" firstStartedPulling="2024-12-13 02:11:39.301239317 +0000 UTC m=+45.899709703" lastFinishedPulling="2024-12-13 02:11:47.610804734 +0000 UTC m=+54.209275128" observedRunningTime="2024-12-13 02:11:47.877037984 +0000 UTC m=+54.475508373" watchObservedRunningTime="2024-12-13 02:11:48.525262991 +0000 UTC m=+55.123733395" Dec 13 02:11:48.527597 env[1220]: time="2024-12-13T02:11:48.527139643Z" level=info msg="StopContainer for \"3f5490693aa4f7ab6387ecae9518ef55af714d132471d47b16a66e6830ac9848\" with timeout 300 (s)" Dec 13 02:11:48.528094 env[1220]: time="2024-12-13T02:11:48.527910036Z" level=info msg="Stop container \"3f5490693aa4f7ab6387ecae9518ef55af714d132471d47b16a66e6830ac9848\" with signal terminated" Dec 13 02:11:48.585000 audit[4286]: NETFILTER_CFG table=filter:119 family=2 entries=10 op=nft_register_rule pid=4286 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:11:48.585000 audit[4286]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fffc1783fd0 a2=0 a3=7fffc1783fbc items=0 ppid=2179 pid=4286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:48.585000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:11:48.590000 audit[4286]: NETFILTER_CFG table=nat:120 family=2 entries=28 op=nft_register_rule pid=4286 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:11:48.590000 audit[4286]: SYSCALL arch=c000003e syscall=46 success=yes exit=8580 a0=3 a1=7fffc1783fd0 a2=0 a3=7fffc1783fbc items=0 ppid=2179 pid=4286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:48.590000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:11:48.681899 systemd[1]: run-containerd-runc-k8s.io-57d503df536c00d49fcd26d2d9f0d3c259ab11bcc5b0ac34badd5f03d9a3785f-runc.8AsfIM.mount: Deactivated successfully. Dec 13 02:11:48.684089 kubelet[2032]: I1213 02:11:48.684051 2032 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 02:11:48.684257 kubelet[2032]: I1213 02:11:48.684131 2032 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 02:11:48.768481 env[1220]: time="2024-12-13T02:11:48.768412412Z" level=info msg="StopContainer for \"3828e015e9131383d7316db205f2c6bc3463c58182ec730597a6213154ef47e0\" with timeout 30 (s)" Dec 13 02:11:48.769075 env[1220]: time="2024-12-13T02:11:48.769030717Z" level=info msg="Stop container \"3828e015e9131383d7316db205f2c6bc3463c58182ec730597a6213154ef47e0\" with signal terminated" Dec 13 02:11:48.828994 systemd[1]: cri-containerd-3828e015e9131383d7316db205f2c6bc3463c58182ec730597a6213154ef47e0.scope: Deactivated successfully. Dec 13 02:11:48.827000 audit: BPF prog-id=203 op=UNLOAD Dec 13 02:11:48.832000 audit: BPF prog-id=206 op=UNLOAD Dec 13 02:11:48.879208 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3828e015e9131383d7316db205f2c6bc3463c58182ec730597a6213154ef47e0-rootfs.mount: Deactivated successfully. Dec 13 02:11:48.882787 env[1220]: time="2024-12-13T02:11:48.882728574Z" level=info msg="shim disconnected" id=3828e015e9131383d7316db205f2c6bc3463c58182ec730597a6213154ef47e0 Dec 13 02:11:48.882957 env[1220]: time="2024-12-13T02:11:48.882792438Z" level=warning msg="cleaning up after shim disconnected" id=3828e015e9131383d7316db205f2c6bc3463c58182ec730597a6213154ef47e0 namespace=k8s.io Dec 13 02:11:48.882957 env[1220]: time="2024-12-13T02:11:48.882808766Z" level=info msg="cleaning up dead shim" Dec 13 02:11:48.900754 env[1220]: time="2024-12-13T02:11:48.900674319Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:11:48Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4327 runtime=io.containerd.runc.v2\n" Dec 13 02:11:48.967709 kubelet[2032]: I1213 02:11:48.967662 2032 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:11:48.990885 env[1220]: time="2024-12-13T02:11:48.990826793Z" level=info msg="StopContainer for \"57d503df536c00d49fcd26d2d9f0d3c259ab11bcc5b0ac34badd5f03d9a3785f\" with timeout 5 (s)" Dec 13 02:11:48.991375 env[1220]: time="2024-12-13T02:11:48.991338783Z" level=info msg="Stop container \"57d503df536c00d49fcd26d2d9f0d3c259ab11bcc5b0ac34badd5f03d9a3785f\" with signal terminated" Dec 13 02:11:49.113800 systemd[1]: cri-containerd-57d503df536c00d49fcd26d2d9f0d3c259ab11bcc5b0ac34badd5f03d9a3785f.scope: Deactivated successfully. Dec 13 02:11:49.114166 systemd[1]: cri-containerd-57d503df536c00d49fcd26d2d9f0d3c259ab11bcc5b0ac34badd5f03d9a3785f.scope: Consumed 2.130s CPU time. Dec 13 02:11:49.153000 audit[4355]: NETFILTER_CFG table=filter:121 family=2 entries=9 op=nft_register_rule pid=4355 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:11:49.153000 audit[4355]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffac4bdd70 a2=0 a3=7fffac4bdd5c items=0 ppid=2179 pid=4355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:49.153000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:11:49.160389 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-57d503df536c00d49fcd26d2d9f0d3c259ab11bcc5b0ac34badd5f03d9a3785f-rootfs.mount: Deactivated successfully. Dec 13 02:11:49.166768 env[1220]: time="2024-12-13T02:11:49.166697284Z" level=info msg="shim disconnected" id=57d503df536c00d49fcd26d2d9f0d3c259ab11bcc5b0ac34badd5f03d9a3785f Dec 13 02:11:49.166914 env[1220]: time="2024-12-13T02:11:49.166764951Z" level=warning msg="cleaning up after shim disconnected" id=57d503df536c00d49fcd26d2d9f0d3c259ab11bcc5b0ac34badd5f03d9a3785f namespace=k8s.io Dec 13 02:11:49.166914 env[1220]: time="2024-12-13T02:11:49.166795637Z" level=info msg="cleaning up dead shim" Dec 13 02:11:49.172000 audit[4355]: NETFILTER_CFG table=nat:122 family=2 entries=27 op=nft_register_chain pid=4355 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:11:49.172000 audit[4355]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fffac4bdd70 a2=0 a3=7fffac4bdd5c items=0 ppid=2179 pid=4355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:49.172000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:11:49.181222 env[1220]: time="2024-12-13T02:11:49.181170589Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:11:49Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4362 runtime=io.containerd.runc.v2\n" Dec 13 02:11:50.211654 kernel: kauditd_printk_skb: 216 callbacks suppressed Dec 13 02:11:50.211976 kernel: audit: type=1400 audit(1734055910.189:1249): avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:11:50.189000 audit[1874]: AVC avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:11:50.189000 audit[1874]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c006d9a5a0 a2=fc6 a3=0 items=0 ppid=1759 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 key=(null) Dec 13 02:11:50.189000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3734002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:11:50.284949 kernel: audit: type=1300 audit(1734055910.189:1249): arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c006d9a5a0 a2=fc6 a3=0 items=0 ppid=1759 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 key=(null) Dec 13 02:11:50.285150 kernel: audit: type=1327 audit(1734055910.189:1249): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3734002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:11:50.285221 kernel: audit: type=1400 audit(1734055910.210:1250): avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:11:50.210000 audit[1874]: AVC avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:11:50.210000 audit[1874]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00ab227a0 a2=fc6 a3=0 items=0 ppid=1759 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 key=(null) Dec 13 02:11:50.344978 kernel: audit: type=1300 audit(1734055910.210:1250): arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00ab227a0 a2=fc6 a3=0 items=0 ppid=1759 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 key=(null) Dec 13 02:11:50.210000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3734002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:11:50.383587 kernel: audit: type=1327 audit(1734055910.210:1250): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3734002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:11:50.210000 audit[1874]: AVC avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7318 scontext=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:11:50.210000 audit[1874]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c006d9aed0 a2=fc6 a3=0 items=0 ppid=1759 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 key=(null) Dec 13 02:11:50.446112 kernel: audit: type=1400 audit(1734055910.210:1251): avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7318 scontext=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:11:50.446315 kernel: audit: type=1300 audit(1734055910.210:1251): arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c006d9aed0 a2=fc6 a3=0 items=0 ppid=1759 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 key=(null) Dec 13 02:11:50.210000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3734002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:11:50.476597 kernel: audit: type=1327 audit(1734055910.210:1251): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3734002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:11:50.476837 kernel: audit: type=1400 audit(1734055910.236:1252): avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7320 scontext=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:11:50.236000 audit[1874]: AVC avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7320 scontext=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:11:50.236000 audit[1874]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c0052ba840 a2=fc6 a3=0 items=0 ppid=1759 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 key=(null) Dec 13 02:11:50.236000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3734002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:11:50.241000 audit[1874]: AVC avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:11:50.241000 audit[1874]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c009ff5aa0 a2=fc6 a3=0 items=0 ppid=1759 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 key=(null) Dec 13 02:11:50.241000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3734002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:11:50.246000 audit[1874]: AVC avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7318 scontext=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:11:50.246000 audit[1874]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c0052ba960 a2=fc6 a3=0 items=0 ppid=1759 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 key=(null) Dec 13 02:11:50.246000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3734002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:11:50.964000 audit: BPF prog-id=135 op=UNLOAD Dec 13 02:11:50.964276 systemd[1]: cri-containerd-3f5490693aa4f7ab6387ecae9518ef55af714d132471d47b16a66e6830ac9848.scope: Deactivated successfully. Dec 13 02:11:50.968000 audit: BPF prog-id=138 op=UNLOAD Dec 13 02:11:51.022537 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3f5490693aa4f7ab6387ecae9518ef55af714d132471d47b16a66e6830ac9848-rootfs.mount: Deactivated successfully. Dec 13 02:11:51.028488 env[1220]: time="2024-12-13T02:11:51.026515647Z" level=info msg="shim disconnected" id=3f5490693aa4f7ab6387ecae9518ef55af714d132471d47b16a66e6830ac9848 Dec 13 02:11:51.028488 env[1220]: time="2024-12-13T02:11:51.026601436Z" level=warning msg="cleaning up after shim disconnected" id=3f5490693aa4f7ab6387ecae9518ef55af714d132471d47b16a66e6830ac9848 namespace=k8s.io Dec 13 02:11:51.028488 env[1220]: time="2024-12-13T02:11:51.026623202Z" level=info msg="cleaning up dead shim" Dec 13 02:11:51.046547 env[1220]: time="2024-12-13T02:11:51.046454612Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:11:51Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4390 runtime=io.containerd.runc.v2\n" Dec 13 02:11:51.086783 env[1220]: time="2024-12-13T02:11:51.086708291Z" level=info msg="StopContainer for \"3828e015e9131383d7316db205f2c6bc3463c58182ec730597a6213154ef47e0\" returns successfully" Dec 13 02:11:51.087695 env[1220]: time="2024-12-13T02:11:51.087623433Z" level=info msg="StopPodSandbox for \"87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729\"" Dec 13 02:11:51.098726 env[1220]: time="2024-12-13T02:11:51.087747829Z" level=info msg="Container to stop \"3828e015e9131383d7316db205f2c6bc3463c58182ec730597a6213154ef47e0\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 02:11:51.098726 env[1220]: time="2024-12-13T02:11:51.088477638Z" level=info msg="StopContainer for \"3f5490693aa4f7ab6387ecae9518ef55af714d132471d47b16a66e6830ac9848\" returns successfully" Dec 13 02:11:51.098316 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729-shm.mount: Deactivated successfully. Dec 13 02:11:51.099506 env[1220]: time="2024-12-13T02:11:51.099459145Z" level=info msg="StopPodSandbox for \"04eb8a1c240375ceae28c4d7d6ab09a026f57eb626ba647968a8ebdfa892c858\"" Dec 13 02:11:51.099973 env[1220]: time="2024-12-13T02:11:51.099926533Z" level=info msg="Container to stop \"3f5490693aa4f7ab6387ecae9518ef55af714d132471d47b16a66e6830ac9848\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 02:11:51.101595 env[1220]: time="2024-12-13T02:11:51.100949289Z" level=info msg="StopContainer for \"57d503df536c00d49fcd26d2d9f0d3c259ab11bcc5b0ac34badd5f03d9a3785f\" returns successfully" Dec 13 02:11:51.102165 env[1220]: time="2024-12-13T02:11:51.101916662Z" level=info msg="StopPodSandbox for \"f3e6dda92d7ffa46ca75e93f3904b2dca781160ac02cd308b41501c50cbdd61e\"" Dec 13 02:11:51.102165 env[1220]: time="2024-12-13T02:11:51.101991703Z" level=info msg="Container to stop \"57d503df536c00d49fcd26d2d9f0d3c259ab11bcc5b0ac34badd5f03d9a3785f\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 02:11:51.102165 env[1220]: time="2024-12-13T02:11:51.102026504Z" level=info msg="Container to stop \"5472fbc0ebc97c5a180051c8579a601bca51e00deadadfaa206b9ad1e1ecfb0f\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 02:11:51.102165 env[1220]: time="2024-12-13T02:11:51.102047177Z" level=info msg="Container to stop \"849f3f13f8f873873fac188c941ad33675f219197487404335247f85101eca8c\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 02:11:51.108620 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f3e6dda92d7ffa46ca75e93f3904b2dca781160ac02cd308b41501c50cbdd61e-shm.mount: Deactivated successfully. Dec 13 02:11:51.121811 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-04eb8a1c240375ceae28c4d7d6ab09a026f57eb626ba647968a8ebdfa892c858-shm.mount: Deactivated successfully. Dec 13 02:11:51.147191 systemd[1]: cri-containerd-04eb8a1c240375ceae28c4d7d6ab09a026f57eb626ba647968a8ebdfa892c858.scope: Deactivated successfully. Dec 13 02:11:51.147000 audit: BPF prog-id=127 op=UNLOAD Dec 13 02:11:51.151000 audit: BPF prog-id=130 op=UNLOAD Dec 13 02:11:51.162304 systemd[1]: cri-containerd-f3e6dda92d7ffa46ca75e93f3904b2dca781160ac02cd308b41501c50cbdd61e.scope: Deactivated successfully. Dec 13 02:11:51.162000 audit: BPF prog-id=131 op=UNLOAD Dec 13 02:11:51.163000 audit: BPF prog-id=179 op=UNLOAD Dec 13 02:11:51.164005 systemd[1]: cri-containerd-87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729.scope: Deactivated successfully. Dec 13 02:11:51.167000 audit: BPF prog-id=134 op=UNLOAD Dec 13 02:11:51.167000 audit: BPF prog-id=182 op=UNLOAD Dec 13 02:11:51.212548 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-04eb8a1c240375ceae28c4d7d6ab09a026f57eb626ba647968a8ebdfa892c858-rootfs.mount: Deactivated successfully. Dec 13 02:11:51.219155 env[1220]: time="2024-12-13T02:11:51.217300773Z" level=info msg="shim disconnected" id=04eb8a1c240375ceae28c4d7d6ab09a026f57eb626ba647968a8ebdfa892c858 Dec 13 02:11:51.220607 env[1220]: time="2024-12-13T02:11:51.220540412Z" level=warning msg="cleaning up after shim disconnected" id=04eb8a1c240375ceae28c4d7d6ab09a026f57eb626ba647968a8ebdfa892c858 namespace=k8s.io Dec 13 02:11:51.220834 env[1220]: time="2024-12-13T02:11:51.220804101Z" level=info msg="cleaning up dead shim" Dec 13 02:11:51.250367 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f3e6dda92d7ffa46ca75e93f3904b2dca781160ac02cd308b41501c50cbdd61e-rootfs.mount: Deactivated successfully. Dec 13 02:11:51.254699 env[1220]: time="2024-12-13T02:11:51.254638207Z" level=info msg="shim disconnected" id=f3e6dda92d7ffa46ca75e93f3904b2dca781160ac02cd308b41501c50cbdd61e Dec 13 02:11:51.254928 env[1220]: time="2024-12-13T02:11:51.254898679Z" level=warning msg="cleaning up after shim disconnected" id=f3e6dda92d7ffa46ca75e93f3904b2dca781160ac02cd308b41501c50cbdd61e namespace=k8s.io Dec 13 02:11:51.255116 env[1220]: time="2024-12-13T02:11:51.255090727Z" level=info msg="cleaning up dead shim" Dec 13 02:11:51.264033 env[1220]: time="2024-12-13T02:11:51.263973752Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:11:51Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4449 runtime=io.containerd.runc.v2\n" Dec 13 02:11:51.272633 env[1220]: time="2024-12-13T02:11:51.272525664Z" level=info msg="TearDown network for sandbox \"04eb8a1c240375ceae28c4d7d6ab09a026f57eb626ba647968a8ebdfa892c858\" successfully" Dec 13 02:11:51.273168 env[1220]: time="2024-12-13T02:11:51.273108393Z" level=info msg="StopPodSandbox for \"04eb8a1c240375ceae28c4d7d6ab09a026f57eb626ba647968a8ebdfa892c858\" returns successfully" Dec 13 02:11:51.282804 env[1220]: time="2024-12-13T02:11:51.278528500Z" level=info msg="shim disconnected" id=87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729 Dec 13 02:11:51.282804 env[1220]: time="2024-12-13T02:11:51.278629903Z" level=warning msg="cleaning up after shim disconnected" id=87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729 namespace=k8s.io Dec 13 02:11:51.282804 env[1220]: time="2024-12-13T02:11:51.278649636Z" level=info msg="cleaning up dead shim" Dec 13 02:11:51.315423 env[1220]: time="2024-12-13T02:11:51.315289425Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:11:51Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4468 runtime=io.containerd.runc.v2\n" Dec 13 02:11:51.321681 env[1220]: time="2024-12-13T02:11:51.321613460Z" level=info msg="TearDown network for sandbox \"f3e6dda92d7ffa46ca75e93f3904b2dca781160ac02cd308b41501c50cbdd61e\" successfully" Dec 13 02:11:51.321681 env[1220]: time="2024-12-13T02:11:51.321674203Z" level=info msg="StopPodSandbox for \"f3e6dda92d7ffa46ca75e93f3904b2dca781160ac02cd308b41501c50cbdd61e\" returns successfully" Dec 13 02:11:51.331051 env[1220]: time="2024-12-13T02:11:51.330985732Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:11:51Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4477 runtime=io.containerd.runc.v2\n" Dec 13 02:11:51.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.74:22-139.178.68.195:54708 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:11:51.417783 systemd[1]: Started sshd@8-10.128.0.74:22-139.178.68.195:54708.service. Dec 13 02:11:51.425594 kubelet[2032]: E1213 02:11:51.425092 2032 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="4b6c34b4-cbf1-4a62-9b60-e4dbe333d317" containerName="calico-typha" Dec 13 02:11:51.425594 kubelet[2032]: E1213 02:11:51.425151 2032 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="12da52d6-ae60-4220-8891-d93eb2e8d034" containerName="calico-node" Dec 13 02:11:51.425594 kubelet[2032]: E1213 02:11:51.425165 2032 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="12da52d6-ae60-4220-8891-d93eb2e8d034" containerName="flexvol-driver" Dec 13 02:11:51.425594 kubelet[2032]: E1213 02:11:51.425176 2032 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="12da52d6-ae60-4220-8891-d93eb2e8d034" containerName="install-cni" Dec 13 02:11:51.425594 kubelet[2032]: I1213 02:11:51.425238 2032 memory_manager.go:354] "RemoveStaleState removing state" podUID="12da52d6-ae60-4220-8891-d93eb2e8d034" containerName="calico-node" Dec 13 02:11:51.425594 kubelet[2032]: I1213 02:11:51.425251 2032 memory_manager.go:354] "RemoveStaleState removing state" podUID="4b6c34b4-cbf1-4a62-9b60-e4dbe333d317" containerName="calico-typha" Dec 13 02:11:51.434399 systemd[1]: Created slice kubepods-besteffort-podc55b3c83_e489_47e2_a4be_300aa934e420.slice. Dec 13 02:11:51.456022 kubelet[2032]: I1213 02:11:51.455972 2032 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/12da52d6-ae60-4220-8891-d93eb2e8d034-lib-modules\") pod \"12da52d6-ae60-4220-8891-d93eb2e8d034\" (UID: \"12da52d6-ae60-4220-8891-d93eb2e8d034\") " Dec 13 02:11:51.456240 kubelet[2032]: I1213 02:11:51.456026 2032 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/12da52d6-ae60-4220-8891-d93eb2e8d034-flexvol-driver-host\") pod \"12da52d6-ae60-4220-8891-d93eb2e8d034\" (UID: \"12da52d6-ae60-4220-8891-d93eb2e8d034\") " Dec 13 02:11:51.456240 kubelet[2032]: I1213 02:11:51.456077 2032 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/12da52d6-ae60-4220-8891-d93eb2e8d034-cni-bin-dir\") pod \"12da52d6-ae60-4220-8891-d93eb2e8d034\" (UID: \"12da52d6-ae60-4220-8891-d93eb2e8d034\") " Dec 13 02:11:51.456240 kubelet[2032]: I1213 02:11:51.456115 2032 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/12da52d6-ae60-4220-8891-d93eb2e8d034-node-certs\") pod \"12da52d6-ae60-4220-8891-d93eb2e8d034\" (UID: \"12da52d6-ae60-4220-8891-d93eb2e8d034\") " Dec 13 02:11:51.456240 kubelet[2032]: I1213 02:11:51.456171 2032 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/4b6c34b4-cbf1-4a62-9b60-e4dbe333d317-typha-certs\") pod \"4b6c34b4-cbf1-4a62-9b60-e4dbe333d317\" (UID: \"4b6c34b4-cbf1-4a62-9b60-e4dbe333d317\") " Dec 13 02:11:51.456240 kubelet[2032]: I1213 02:11:51.456194 2032 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/12da52d6-ae60-4220-8891-d93eb2e8d034-policysync\") pod \"12da52d6-ae60-4220-8891-d93eb2e8d034\" (UID: \"12da52d6-ae60-4220-8891-d93eb2e8d034\") " Dec 13 02:11:51.456240 kubelet[2032]: I1213 02:11:51.456235 2032 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/12da52d6-ae60-4220-8891-d93eb2e8d034-cni-net-dir\") pod \"12da52d6-ae60-4220-8891-d93eb2e8d034\" (UID: \"12da52d6-ae60-4220-8891-d93eb2e8d034\") " Dec 13 02:11:51.460850 kubelet[2032]: I1213 02:11:51.456262 2032 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/12da52d6-ae60-4220-8891-d93eb2e8d034-cni-log-dir\") pod \"12da52d6-ae60-4220-8891-d93eb2e8d034\" (UID: \"12da52d6-ae60-4220-8891-d93eb2e8d034\") " Dec 13 02:11:51.460850 kubelet[2032]: I1213 02:11:51.456287 2032 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/12da52d6-ae60-4220-8891-d93eb2e8d034-xtables-lock\") pod \"12da52d6-ae60-4220-8891-d93eb2e8d034\" (UID: \"12da52d6-ae60-4220-8891-d93eb2e8d034\") " Dec 13 02:11:51.460850 kubelet[2032]: I1213 02:11:51.456339 2032 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/12da52d6-ae60-4220-8891-d93eb2e8d034-tigera-ca-bundle\") pod \"12da52d6-ae60-4220-8891-d93eb2e8d034\" (UID: \"12da52d6-ae60-4220-8891-d93eb2e8d034\") " Dec 13 02:11:51.460850 kubelet[2032]: I1213 02:11:51.456371 2032 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/12da52d6-ae60-4220-8891-d93eb2e8d034-var-lib-calico\") pod \"12da52d6-ae60-4220-8891-d93eb2e8d034\" (UID: \"12da52d6-ae60-4220-8891-d93eb2e8d034\") " Dec 13 02:11:51.460850 kubelet[2032]: I1213 02:11:51.456420 2032 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"kube-api-access-hmf5n\" (UniqueName: \"kubernetes.io/projected/12da52d6-ae60-4220-8891-d93eb2e8d034-kube-api-access-hmf5n\") pod \"12da52d6-ae60-4220-8891-d93eb2e8d034\" (UID: \"12da52d6-ae60-4220-8891-d93eb2e8d034\") " Dec 13 02:11:51.460850 kubelet[2032]: I1213 02:11:51.456455 2032 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"kube-api-access-h6t6z\" (UniqueName: \"kubernetes.io/projected/4b6c34b4-cbf1-4a62-9b60-e4dbe333d317-kube-api-access-h6t6z\") pod \"4b6c34b4-cbf1-4a62-9b60-e4dbe333d317\" (UID: \"4b6c34b4-cbf1-4a62-9b60-e4dbe333d317\") " Dec 13 02:11:51.461249 kubelet[2032]: I1213 02:11:51.456502 2032 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/12da52d6-ae60-4220-8891-d93eb2e8d034-var-run-calico\") pod \"12da52d6-ae60-4220-8891-d93eb2e8d034\" (UID: \"12da52d6-ae60-4220-8891-d93eb2e8d034\") " Dec 13 02:11:51.461249 kubelet[2032]: I1213 02:11:51.456534 2032 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4b6c34b4-cbf1-4a62-9b60-e4dbe333d317-tigera-ca-bundle\") pod \"4b6c34b4-cbf1-4a62-9b60-e4dbe333d317\" (UID: \"4b6c34b4-cbf1-4a62-9b60-e4dbe333d317\") " Dec 13 02:11:51.461249 kubelet[2032]: I1213 02:11:51.457533 2032 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/12da52d6-ae60-4220-8891-d93eb2e8d034-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "12da52d6-ae60-4220-8891-d93eb2e8d034" (UID: "12da52d6-ae60-4220-8891-d93eb2e8d034"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:11:51.461249 kubelet[2032]: I1213 02:11:51.457644 2032 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/12da52d6-ae60-4220-8891-d93eb2e8d034-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "12da52d6-ae60-4220-8891-d93eb2e8d034" (UID: "12da52d6-ae60-4220-8891-d93eb2e8d034"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:11:51.461249 kubelet[2032]: I1213 02:11:51.457687 2032 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/12da52d6-ae60-4220-8891-d93eb2e8d034-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "12da52d6-ae60-4220-8891-d93eb2e8d034" (UID: "12da52d6-ae60-4220-8891-d93eb2e8d034"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:11:51.461600 kubelet[2032]: I1213 02:11:51.457734 2032 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/12da52d6-ae60-4220-8891-d93eb2e8d034-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "12da52d6-ae60-4220-8891-d93eb2e8d034" (UID: "12da52d6-ae60-4220-8891-d93eb2e8d034"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:11:51.461600 kubelet[2032]: I1213 02:11:51.460819 2032 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/12da52d6-ae60-4220-8891-d93eb2e8d034-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "12da52d6-ae60-4220-8891-d93eb2e8d034" (UID: "12da52d6-ae60-4220-8891-d93eb2e8d034"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:11:51.461600 kubelet[2032]: I1213 02:11:51.460893 2032 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/12da52d6-ae60-4220-8891-d93eb2e8d034-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "12da52d6-ae60-4220-8891-d93eb2e8d034" (UID: "12da52d6-ae60-4220-8891-d93eb2e8d034"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:11:51.461801 kubelet[2032]: I1213 02:11:51.461632 2032 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/12da52d6-ae60-4220-8891-d93eb2e8d034-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "12da52d6-ae60-4220-8891-d93eb2e8d034" (UID: "12da52d6-ae60-4220-8891-d93eb2e8d034"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:11:51.480777 kubelet[2032]: I1213 02:11:51.477851 2032 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/12da52d6-ae60-4220-8891-d93eb2e8d034-policysync" (OuterVolumeSpecName: "policysync") pod "12da52d6-ae60-4220-8891-d93eb2e8d034" (UID: "12da52d6-ae60-4220-8891-d93eb2e8d034"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:11:51.487782 kubelet[2032]: I1213 02:11:51.485197 2032 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/12da52d6-ae60-4220-8891-d93eb2e8d034-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "12da52d6-ae60-4220-8891-d93eb2e8d034" (UID: "12da52d6-ae60-4220-8891-d93eb2e8d034"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:11:51.503059 kubelet[2032]: I1213 02:11:51.503000 2032 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/4b6c34b4-cbf1-4a62-9b60-e4dbe333d317-kube-api-access-h6t6z" (OuterVolumeSpecName: "kube-api-access-h6t6z") pod "4b6c34b4-cbf1-4a62-9b60-e4dbe333d317" (UID: "4b6c34b4-cbf1-4a62-9b60-e4dbe333d317"). InnerVolumeSpecName "kube-api-access-h6t6z". PluginName "kubernetes.io/projected", VolumeGidValue "" Dec 13 02:11:51.503493 kubelet[2032]: I1213 02:11:51.503462 2032 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/4b6c34b4-cbf1-4a62-9b60-e4dbe333d317-typha-certs" (OuterVolumeSpecName: "typha-certs") pod "4b6c34b4-cbf1-4a62-9b60-e4dbe333d317" (UID: "4b6c34b4-cbf1-4a62-9b60-e4dbe333d317"). InnerVolumeSpecName "typha-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Dec 13 02:11:51.504380 kubelet[2032]: I1213 02:11:51.504343 2032 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/12da52d6-ae60-4220-8891-d93eb2e8d034-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "12da52d6-ae60-4220-8891-d93eb2e8d034" (UID: "12da52d6-ae60-4220-8891-d93eb2e8d034"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Dec 13 02:11:51.505183 kubelet[2032]: I1213 02:11:51.505149 2032 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/4b6c34b4-cbf1-4a62-9b60-e4dbe333d317-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "4b6c34b4-cbf1-4a62-9b60-e4dbe333d317" (UID: "4b6c34b4-cbf1-4a62-9b60-e4dbe333d317"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Dec 13 02:11:51.507889 kubelet[2032]: I1213 02:11:51.507854 2032 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/12da52d6-ae60-4220-8891-d93eb2e8d034-node-certs" (OuterVolumeSpecName: "node-certs") pod "12da52d6-ae60-4220-8891-d93eb2e8d034" (UID: "12da52d6-ae60-4220-8891-d93eb2e8d034"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Dec 13 02:11:51.510892 kubelet[2032]: I1213 02:11:51.510855 2032 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/12da52d6-ae60-4220-8891-d93eb2e8d034-kube-api-access-hmf5n" (OuterVolumeSpecName: "kube-api-access-hmf5n") pod "12da52d6-ae60-4220-8891-d93eb2e8d034" (UID: "12da52d6-ae60-4220-8891-d93eb2e8d034"). InnerVolumeSpecName "kube-api-access-hmf5n". PluginName "kubernetes.io/projected", VolumeGidValue "" Dec 13 02:11:51.525605 systemd-networkd[1019]: cali597f316fb57: Link DOWN Dec 13 02:11:51.525617 systemd-networkd[1019]: cali597f316fb57: Lost carrier Dec 13 02:11:51.540000 audit[4531]: NETFILTER_CFG table=filter:123 family=2 entries=9 op=nft_register_rule pid=4531 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:11:51.540000 audit[4531]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe0d29bdd0 a2=0 a3=7ffe0d29bdbc items=0 ppid=2179 pid=4531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:51.540000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:11:51.558000 audit[4531]: NETFILTER_CFG table=nat:124 family=2 entries=27 op=nft_unregister_chain pid=4531 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:11:51.558000 audit[4531]: SYSCALL arch=c000003e syscall=46 success=yes exit=6028 a0=3 a1=7ffe0d29bdd0 a2=0 a3=7ffe0d29bdbc items=0 ppid=2179 pid=4531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:51.558000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:11:51.573435 kubelet[2032]: I1213 02:11:51.573396 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/c55b3c83-e489-47e2-a4be-300aa934e420-cni-net-dir\") pod \"calico-node-rzlbz\" (UID: \"c55b3c83-e489-47e2-a4be-300aa934e420\") " pod="calico-system/calico-node-rzlbz" Dec 13 02:11:51.574500 kubelet[2032]: I1213 02:11:51.574471 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kfxsk\" (UniqueName: \"kubernetes.io/projected/c55b3c83-e489-47e2-a4be-300aa934e420-kube-api-access-kfxsk\") pod \"calico-node-rzlbz\" (UID: \"c55b3c83-e489-47e2-a4be-300aa934e420\") " pod="calico-system/calico-node-rzlbz" Dec 13 02:11:51.574754 kubelet[2032]: I1213 02:11:51.574732 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/c55b3c83-e489-47e2-a4be-300aa934e420-policysync\") pod \"calico-node-rzlbz\" (UID: \"c55b3c83-e489-47e2-a4be-300aa934e420\") " pod="calico-system/calico-node-rzlbz" Dec 13 02:11:51.575022 kubelet[2032]: I1213 02:11:51.575005 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/c55b3c83-e489-47e2-a4be-300aa934e420-node-certs\") pod \"calico-node-rzlbz\" (UID: \"c55b3c83-e489-47e2-a4be-300aa934e420\") " pod="calico-system/calico-node-rzlbz" Dec 13 02:11:51.575663 kubelet[2032]: I1213 02:11:51.575639 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/c55b3c83-e489-47e2-a4be-300aa934e420-var-lib-calico\") pod \"calico-node-rzlbz\" (UID: \"c55b3c83-e489-47e2-a4be-300aa934e420\") " pod="calico-system/calico-node-rzlbz" Dec 13 02:11:51.580986 kubelet[2032]: I1213 02:11:51.580630 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/c55b3c83-e489-47e2-a4be-300aa934e420-var-run-calico\") pod \"calico-node-rzlbz\" (UID: \"c55b3c83-e489-47e2-a4be-300aa934e420\") " pod="calico-system/calico-node-rzlbz" Dec 13 02:11:51.597497 kubelet[2032]: I1213 02:11:51.597430 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/c55b3c83-e489-47e2-a4be-300aa934e420-xtables-lock\") pod \"calico-node-rzlbz\" (UID: \"c55b3c83-e489-47e2-a4be-300aa934e420\") " pod="calico-system/calico-node-rzlbz" Dec 13 02:11:51.603940 systemd[1]: Removed slice kubepods-besteffort-pod12da52d6_ae60_4220_8891_d93eb2e8d034.slice. Dec 13 02:11:51.604179 systemd[1]: kubepods-besteffort-pod12da52d6_ae60_4220_8891_d93eb2e8d034.slice: Consumed 2.834s CPU time. Dec 13 02:11:51.609893 kubelet[2032]: I1213 02:11:51.603130 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/c55b3c83-e489-47e2-a4be-300aa934e420-lib-modules\") pod \"calico-node-rzlbz\" (UID: \"c55b3c83-e489-47e2-a4be-300aa934e420\") " pod="calico-system/calico-node-rzlbz" Dec 13 02:11:51.610375 kubelet[2032]: I1213 02:11:51.610330 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/c55b3c83-e489-47e2-a4be-300aa934e420-cni-log-dir\") pod \"calico-node-rzlbz\" (UID: \"c55b3c83-e489-47e2-a4be-300aa934e420\") " pod="calico-system/calico-node-rzlbz" Dec 13 02:11:51.612695 systemd[1]: Removed slice kubepods-besteffort-pod4b6c34b4_cbf1_4a62_9b60_e4dbe333d317.slice. Dec 13 02:11:51.614460 kubelet[2032]: I1213 02:11:51.611393 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c55b3c83-e489-47e2-a4be-300aa934e420-tigera-ca-bundle\") pod \"calico-node-rzlbz\" (UID: \"c55b3c83-e489-47e2-a4be-300aa934e420\") " pod="calico-system/calico-node-rzlbz" Dec 13 02:11:51.614797 kubelet[2032]: I1213 02:11:51.614768 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/c55b3c83-e489-47e2-a4be-300aa934e420-cni-bin-dir\") pod \"calico-node-rzlbz\" (UID: \"c55b3c83-e489-47e2-a4be-300aa934e420\") " pod="calico-system/calico-node-rzlbz" Dec 13 02:11:51.615074 kubelet[2032]: I1213 02:11:51.615046 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/c55b3c83-e489-47e2-a4be-300aa934e420-flexvol-driver-host\") pod \"calico-node-rzlbz\" (UID: \"c55b3c83-e489-47e2-a4be-300aa934e420\") " pod="calico-system/calico-node-rzlbz" Dec 13 02:11:51.615611 kubelet[2032]: I1213 02:11:51.615588 2032 reconciler_common.go:288] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/12da52d6-ae60-4220-8891-d93eb2e8d034-flexvol-driver-host\") on node \"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 02:11:51.615789 kubelet[2032]: I1213 02:11:51.615771 2032 reconciler_common.go:288] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/12da52d6-ae60-4220-8891-d93eb2e8d034-lib-modules\") on node \"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 02:11:51.615944 kubelet[2032]: I1213 02:11:51.615926 2032 reconciler_common.go:288] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/12da52d6-ae60-4220-8891-d93eb2e8d034-xtables-lock\") on node \"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 02:11:51.616940 kubelet[2032]: I1213 02:11:51.616681 2032 reconciler_common.go:288] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/12da52d6-ae60-4220-8891-d93eb2e8d034-cni-net-dir\") on node \"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 02:11:51.616940 kubelet[2032]: I1213 02:11:51.616712 2032 reconciler_common.go:288] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/12da52d6-ae60-4220-8891-d93eb2e8d034-cni-log-dir\") on node \"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 02:11:51.616940 kubelet[2032]: I1213 02:11:51.616783 2032 reconciler_common.go:288] "Volume detached for volume \"kube-api-access-hmf5n\" (UniqueName: \"kubernetes.io/projected/12da52d6-ae60-4220-8891-d93eb2e8d034-kube-api-access-hmf5n\") on node \"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 02:11:51.616940 kubelet[2032]: I1213 02:11:51.616829 2032 reconciler_common.go:288] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/12da52d6-ae60-4220-8891-d93eb2e8d034-var-lib-calico\") on node \"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 02:11:51.616940 kubelet[2032]: I1213 02:11:51.616848 2032 reconciler_common.go:288] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/12da52d6-ae60-4220-8891-d93eb2e8d034-var-run-calico\") on node \"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 02:11:51.616940 kubelet[2032]: I1213 02:11:51.616865 2032 reconciler_common.go:288] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4b6c34b4-cbf1-4a62-9b60-e4dbe333d317-tigera-ca-bundle\") on node \"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 02:11:51.616940 kubelet[2032]: I1213 02:11:51.616882 2032 reconciler_common.go:288] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/12da52d6-ae60-4220-8891-d93eb2e8d034-cni-bin-dir\") on node \"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 02:11:51.617394 kubelet[2032]: I1213 02:11:51.616919 2032 reconciler_common.go:288] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/12da52d6-ae60-4220-8891-d93eb2e8d034-node-certs\") on node \"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 02:11:51.617394 kubelet[2032]: I1213 02:11:51.616935 2032 reconciler_common.go:288] "Volume detached for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/4b6c34b4-cbf1-4a62-9b60-e4dbe333d317-typha-certs\") on node \"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 02:11:51.617394 kubelet[2032]: I1213 02:11:51.616950 2032 reconciler_common.go:288] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/12da52d6-ae60-4220-8891-d93eb2e8d034-policysync\") on node \"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 02:11:51.617394 kubelet[2032]: I1213 02:11:51.616991 2032 reconciler_common.go:288] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/12da52d6-ae60-4220-8891-d93eb2e8d034-tigera-ca-bundle\") on node \"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 02:11:51.617394 kubelet[2032]: I1213 02:11:51.617021 2032 reconciler_common.go:288] "Volume detached for volume \"kube-api-access-h6t6z\" (UniqueName: \"kubernetes.io/projected/4b6c34b4-cbf1-4a62-9b60-e4dbe333d317-kube-api-access-h6t6z\") on node \"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 02:11:51.689000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:11:51.689000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003089700 a2=fc6 a3=0 items=0 ppid=1751 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 key=(null) Dec 13 02:11:51.689000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:11:51.690000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7318 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:11:51.690000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b3c300 a2=fc6 a3=0 items=0 ppid=1751 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 key=(null) Dec 13 02:11:51.690000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:11:51.715421 env[1220]: 2024-12-13 02:11:51.523 [INFO][4514] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" Dec 13 02:11:51.715421 env[1220]: 2024-12-13 02:11:51.524 [INFO][4514] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" iface="eth0" netns="/var/run/netns/cni-62c8a049-ca4d-9b8d-ee1f-3b75dcb49ed9" Dec 13 02:11:51.715421 env[1220]: 2024-12-13 02:11:51.524 [INFO][4514] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" iface="eth0" netns="/var/run/netns/cni-62c8a049-ca4d-9b8d-ee1f-3b75dcb49ed9" Dec 13 02:11:51.715421 env[1220]: 2024-12-13 02:11:51.543 [INFO][4514] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" after=19.632186ms iface="eth0" netns="/var/run/netns/cni-62c8a049-ca4d-9b8d-ee1f-3b75dcb49ed9" Dec 13 02:11:51.715421 env[1220]: 2024-12-13 02:11:51.543 [INFO][4514] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" Dec 13 02:11:51.715421 env[1220]: 2024-12-13 02:11:51.544 [INFO][4514] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" Dec 13 02:11:51.715421 env[1220]: 2024-12-13 02:11:51.598 [INFO][4533] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" HandleID="k8s-pod-network.87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--665858c48b--kkf7t-eth0" Dec 13 02:11:51.715421 env[1220]: 2024-12-13 02:11:51.598 [INFO][4533] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:11:51.715421 env[1220]: 2024-12-13 02:11:51.598 [INFO][4533] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:11:51.715421 env[1220]: 2024-12-13 02:11:51.709 [INFO][4533] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" HandleID="k8s-pod-network.87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--665858c48b--kkf7t-eth0" Dec 13 02:11:51.715421 env[1220]: 2024-12-13 02:11:51.709 [INFO][4533] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" HandleID="k8s-pod-network.87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--665858c48b--kkf7t-eth0" Dec 13 02:11:51.715421 env[1220]: 2024-12-13 02:11:51.712 [INFO][4533] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:11:51.715421 env[1220]: 2024-12-13 02:11:51.713 [INFO][4514] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" Dec 13 02:11:51.716320 env[1220]: time="2024-12-13T02:11:51.715710580Z" level=info msg="TearDown network for sandbox \"87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729\" successfully" Dec 13 02:11:51.716320 env[1220]: time="2024-12-13T02:11:51.715758409Z" level=info msg="StopPodSandbox for \"87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729\" returns successfully" Dec 13 02:11:51.724942 env[1220]: time="2024-12-13T02:11:51.724884394Z" level=info msg="StopPodSandbox for \"c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae\"" Dec 13 02:11:51.803000 audit[4521]: USER_ACCT pid=4521 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:11:51.808834 sshd[4521]: Accepted publickey for core from 139.178.68.195 port 54708 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:11:51.810000 audit[4521]: CRED_ACQ pid=4521 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:11:51.810000 audit[4521]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca98ba680 a2=3 a3=0 items=0 ppid=1 pid=4521 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:51.810000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:11:51.811980 sshd[4521]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:11:51.824790 systemd[1]: Started session-8.scope. Dec 13 02:11:51.827309 systemd-logind[1211]: New session 8 of user core. Dec 13 02:11:51.842000 audit[4521]: USER_START pid=4521 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:11:51.845000 audit[4559]: CRED_ACQ pid=4559 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:11:51.871105 kubelet[2032]: I1213 02:11:51.871036 2032 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" Dec 13 02:11:51.875009 kubelet[2032]: I1213 02:11:51.874063 2032 scope.go:117] "RemoveContainer" containerID="57d503df536c00d49fcd26d2d9f0d3c259ab11bcc5b0ac34badd5f03d9a3785f" Dec 13 02:11:51.877632 env[1220]: time="2024-12-13T02:11:51.877553814Z" level=info msg="RemoveContainer for \"57d503df536c00d49fcd26d2d9f0d3c259ab11bcc5b0ac34badd5f03d9a3785f\"" Dec 13 02:11:51.882821 env[1220]: time="2024-12-13T02:11:51.882772341Z" level=info msg="RemoveContainer for \"57d503df536c00d49fcd26d2d9f0d3c259ab11bcc5b0ac34badd5f03d9a3785f\" returns successfully" Dec 13 02:11:51.883466 kubelet[2032]: I1213 02:11:51.883281 2032 scope.go:117] "RemoveContainer" containerID="5472fbc0ebc97c5a180051c8579a601bca51e00deadadfaa206b9ad1e1ecfb0f" Dec 13 02:11:51.888193 env[1220]: time="2024-12-13T02:11:51.888144167Z" level=info msg="RemoveContainer for \"5472fbc0ebc97c5a180051c8579a601bca51e00deadadfaa206b9ad1e1ecfb0f\"" Dec 13 02:11:51.894354 env[1220]: time="2024-12-13T02:11:51.894307032Z" level=info msg="RemoveContainer for \"5472fbc0ebc97c5a180051c8579a601bca51e00deadadfaa206b9ad1e1ecfb0f\" returns successfully" Dec 13 02:11:51.896172 kubelet[2032]: I1213 02:11:51.896142 2032 scope.go:117] "RemoveContainer" containerID="849f3f13f8f873873fac188c941ad33675f219197487404335247f85101eca8c" Dec 13 02:11:51.898548 env[1220]: time="2024-12-13T02:11:51.898505909Z" level=info msg="RemoveContainer for \"849f3f13f8f873873fac188c941ad33675f219197487404335247f85101eca8c\"" Dec 13 02:11:51.951220 env[1220]: time="2024-12-13T02:11:51.951154286Z" level=info msg="RemoveContainer for \"849f3f13f8f873873fac188c941ad33675f219197487404335247f85101eca8c\" returns successfully" Dec 13 02:11:51.951872 kubelet[2032]: I1213 02:11:51.951739 2032 scope.go:117] "RemoveContainer" containerID="57d503df536c00d49fcd26d2d9f0d3c259ab11bcc5b0ac34badd5f03d9a3785f" Dec 13 02:11:51.957316 env[1220]: time="2024-12-13T02:11:51.957088067Z" level=error msg="ContainerStatus for \"57d503df536c00d49fcd26d2d9f0d3c259ab11bcc5b0ac34badd5f03d9a3785f\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"57d503df536c00d49fcd26d2d9f0d3c259ab11bcc5b0ac34badd5f03d9a3785f\": not found" Dec 13 02:11:51.958828 kubelet[2032]: E1213 02:11:51.958786 2032 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"57d503df536c00d49fcd26d2d9f0d3c259ab11bcc5b0ac34badd5f03d9a3785f\": not found" containerID="57d503df536c00d49fcd26d2d9f0d3c259ab11bcc5b0ac34badd5f03d9a3785f" Dec 13 02:11:51.958981 kubelet[2032]: I1213 02:11:51.958861 2032 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"57d503df536c00d49fcd26d2d9f0d3c259ab11bcc5b0ac34badd5f03d9a3785f"} err="failed to get container status \"57d503df536c00d49fcd26d2d9f0d3c259ab11bcc5b0ac34badd5f03d9a3785f\": rpc error: code = NotFound desc = an error occurred when try to find container \"57d503df536c00d49fcd26d2d9f0d3c259ab11bcc5b0ac34badd5f03d9a3785f\": not found" Dec 13 02:11:51.958981 kubelet[2032]: I1213 02:11:51.958899 2032 scope.go:117] "RemoveContainer" containerID="5472fbc0ebc97c5a180051c8579a601bca51e00deadadfaa206b9ad1e1ecfb0f" Dec 13 02:11:51.959551 env[1220]: time="2024-12-13T02:11:51.959458786Z" level=error msg="ContainerStatus for \"5472fbc0ebc97c5a180051c8579a601bca51e00deadadfaa206b9ad1e1ecfb0f\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"5472fbc0ebc97c5a180051c8579a601bca51e00deadadfaa206b9ad1e1ecfb0f\": not found" Dec 13 02:11:51.960025 kubelet[2032]: E1213 02:11:51.959826 2032 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"5472fbc0ebc97c5a180051c8579a601bca51e00deadadfaa206b9ad1e1ecfb0f\": not found" containerID="5472fbc0ebc97c5a180051c8579a601bca51e00deadadfaa206b9ad1e1ecfb0f" Dec 13 02:11:51.960025 kubelet[2032]: I1213 02:11:51.959877 2032 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"5472fbc0ebc97c5a180051c8579a601bca51e00deadadfaa206b9ad1e1ecfb0f"} err="failed to get container status \"5472fbc0ebc97c5a180051c8579a601bca51e00deadadfaa206b9ad1e1ecfb0f\": rpc error: code = NotFound desc = an error occurred when try to find container \"5472fbc0ebc97c5a180051c8579a601bca51e00deadadfaa206b9ad1e1ecfb0f\": not found" Dec 13 02:11:51.960025 kubelet[2032]: I1213 02:11:51.959909 2032 scope.go:117] "RemoveContainer" containerID="849f3f13f8f873873fac188c941ad33675f219197487404335247f85101eca8c" Dec 13 02:11:51.960585 env[1220]: time="2024-12-13T02:11:51.960483777Z" level=error msg="ContainerStatus for \"849f3f13f8f873873fac188c941ad33675f219197487404335247f85101eca8c\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"849f3f13f8f873873fac188c941ad33675f219197487404335247f85101eca8c\": not found" Dec 13 02:11:51.961164 kubelet[2032]: E1213 02:11:51.960986 2032 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"849f3f13f8f873873fac188c941ad33675f219197487404335247f85101eca8c\": not found" containerID="849f3f13f8f873873fac188c941ad33675f219197487404335247f85101eca8c" Dec 13 02:11:51.961164 kubelet[2032]: I1213 02:11:51.961031 2032 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"849f3f13f8f873873fac188c941ad33675f219197487404335247f85101eca8c"} err="failed to get container status \"849f3f13f8f873873fac188c941ad33675f219197487404335247f85101eca8c\": rpc error: code = NotFound desc = an error occurred when try to find container \"849f3f13f8f873873fac188c941ad33675f219197487404335247f85101eca8c\": not found" Dec 13 02:11:51.961164 kubelet[2032]: I1213 02:11:51.961060 2032 scope.go:117] "RemoveContainer" containerID="3f5490693aa4f7ab6387ecae9518ef55af714d132471d47b16a66e6830ac9848" Dec 13 02:11:51.963139 env[1220]: time="2024-12-13T02:11:51.963099276Z" level=info msg="RemoveContainer for \"3f5490693aa4f7ab6387ecae9518ef55af714d132471d47b16a66e6830ac9848\"" Dec 13 02:11:51.980428 env[1220]: time="2024-12-13T02:11:51.980367107Z" level=info msg="RemoveContainer for \"3f5490693aa4f7ab6387ecae9518ef55af714d132471d47b16a66e6830ac9848\" returns successfully" Dec 13 02:11:51.981005 kubelet[2032]: I1213 02:11:51.980971 2032 scope.go:117] "RemoveContainer" containerID="3f5490693aa4f7ab6387ecae9518ef55af714d132471d47b16a66e6830ac9848" Dec 13 02:11:51.981628 env[1220]: time="2024-12-13T02:11:51.981477116Z" level=error msg="ContainerStatus for \"3f5490693aa4f7ab6387ecae9518ef55af714d132471d47b16a66e6830ac9848\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"3f5490693aa4f7ab6387ecae9518ef55af714d132471d47b16a66e6830ac9848\": not found" Dec 13 02:11:51.981989 kubelet[2032]: E1213 02:11:51.981873 2032 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"3f5490693aa4f7ab6387ecae9518ef55af714d132471d47b16a66e6830ac9848\": not found" containerID="3f5490693aa4f7ab6387ecae9518ef55af714d132471d47b16a66e6830ac9848" Dec 13 02:11:51.981989 kubelet[2032]: I1213 02:11:51.981925 2032 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"3f5490693aa4f7ab6387ecae9518ef55af714d132471d47b16a66e6830ac9848"} err="failed to get container status \"3f5490693aa4f7ab6387ecae9518ef55af714d132471d47b16a66e6830ac9848\": rpc error: code = NotFound desc = an error occurred when try to find container \"3f5490693aa4f7ab6387ecae9518ef55af714d132471d47b16a66e6830ac9848\": not found" Dec 13 02:11:52.005199 env[1220]: 2024-12-13 02:11:51.860 [WARNING][4553] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--665858c48b--kkf7t-eth0", GenerateName:"calico-kube-controllers-665858c48b-", Namespace:"calico-system", SelfLink:"", UID:"9822e74c-ada1-4078-8969-5a4ec5af77af", ResourceVersion:"1031", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 11, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"665858c48b", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal", ContainerID:"87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729", Pod:"calico-kube-controllers-665858c48b-kkf7t", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali597f316fb57", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:11:52.005199 env[1220]: 2024-12-13 02:11:51.861 [INFO][4553] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" Dec 13 02:11:52.005199 env[1220]: 2024-12-13 02:11:51.861 [INFO][4553] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" iface="eth0" netns="" Dec 13 02:11:52.005199 env[1220]: 2024-12-13 02:11:51.861 [INFO][4553] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" Dec 13 02:11:52.005199 env[1220]: 2024-12-13 02:11:51.861 [INFO][4553] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" Dec 13 02:11:52.005199 env[1220]: 2024-12-13 02:11:51.982 [INFO][4561] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" HandleID="k8s-pod-network.c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--665858c48b--kkf7t-eth0" Dec 13 02:11:52.005199 env[1220]: 2024-12-13 02:11:51.982 [INFO][4561] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:11:52.005199 env[1220]: 2024-12-13 02:11:51.982 [INFO][4561] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:11:52.005199 env[1220]: 2024-12-13 02:11:51.998 [WARNING][4561] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" HandleID="k8s-pod-network.c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--665858c48b--kkf7t-eth0" Dec 13 02:11:52.005199 env[1220]: 2024-12-13 02:11:51.998 [INFO][4561] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" HandleID="k8s-pod-network.c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--665858c48b--kkf7t-eth0" Dec 13 02:11:52.005199 env[1220]: 2024-12-13 02:11:52.002 [INFO][4561] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:11:52.005199 env[1220]: 2024-12-13 02:11:52.003 [INFO][4553] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" Dec 13 02:11:52.006210 env[1220]: time="2024-12-13T02:11:52.006163440Z" level=info msg="TearDown network for sandbox \"c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae\" successfully" Dec 13 02:11:52.006339 env[1220]: time="2024-12-13T02:11:52.006312403Z" level=info msg="StopPodSandbox for \"c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae\" returns successfully" Dec 13 02:11:52.029875 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729-rootfs.mount: Deactivated successfully. Dec 13 02:11:52.030053 systemd[1]: run-netns-cni\x2d62c8a049\x2dca4d\x2d9b8d\x2dee1f\x2d3b75dcb49ed9.mount: Deactivated successfully. Dec 13 02:11:52.030173 systemd[1]: var-lib-kubelet-pods-12da52d6\x2dae60\x2d4220\x2d8891\x2dd93eb2e8d034-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dnode-1.mount: Deactivated successfully. Dec 13 02:11:52.030304 systemd[1]: var-lib-kubelet-pods-4b6c34b4\x2dcbf1\x2d4a62\x2d9b60\x2de4dbe333d317-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dtypha-1.mount: Deactivated successfully. Dec 13 02:11:52.030407 systemd[1]: var-lib-kubelet-pods-12da52d6\x2dae60\x2d4220\x2d8891\x2dd93eb2e8d034-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dhmf5n.mount: Deactivated successfully. Dec 13 02:11:52.030513 systemd[1]: var-lib-kubelet-pods-12da52d6\x2dae60\x2d4220\x2d8891\x2dd93eb2e8d034-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. Dec 13 02:11:52.032904 systemd[1]: var-lib-kubelet-pods-4b6c34b4\x2dcbf1\x2d4a62\x2d9b60\x2de4dbe333d317-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dh6t6z.mount: Deactivated successfully. Dec 13 02:11:52.033062 systemd[1]: var-lib-kubelet-pods-4b6c34b4\x2dcbf1\x2d4a62\x2d9b60\x2de4dbe333d317-volumes-kubernetes.io\x7esecret-typha\x2dcerts.mount: Deactivated successfully. Dec 13 02:11:52.045991 env[1220]: time="2024-12-13T02:11:52.045931071Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-rzlbz,Uid:c55b3c83-e489-47e2-a4be-300aa934e420,Namespace:calico-system,Attempt:0,}" Dec 13 02:11:52.089956 env[1220]: time="2024-12-13T02:11:52.086422510Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:11:52.091796 env[1220]: time="2024-12-13T02:11:52.090230713Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:11:52.092112 env[1220]: time="2024-12-13T02:11:52.092041575Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:11:52.092587 env[1220]: time="2024-12-13T02:11:52.092517088Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/72cff337df037b04bd84254baeca2cc2094de495bebab97129e1fff400d8f879 pid=4581 runtime=io.containerd.runc.v2 Dec 13 02:11:52.130592 kubelet[2032]: I1213 02:11:52.128001 2032 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/9822e74c-ada1-4078-8969-5a4ec5af77af-tigera-ca-bundle\") pod \"9822e74c-ada1-4078-8969-5a4ec5af77af\" (UID: \"9822e74c-ada1-4078-8969-5a4ec5af77af\") " Dec 13 02:11:52.130592 kubelet[2032]: I1213 02:11:52.128071 2032 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"kube-api-access-jj67n\" (UniqueName: \"kubernetes.io/projected/9822e74c-ada1-4078-8969-5a4ec5af77af-kube-api-access-jj67n\") pod \"9822e74c-ada1-4078-8969-5a4ec5af77af\" (UID: \"9822e74c-ada1-4078-8969-5a4ec5af77af\") " Dec 13 02:11:52.139596 kubelet[2032]: I1213 02:11:52.139525 2032 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/9822e74c-ada1-4078-8969-5a4ec5af77af-kube-api-access-jj67n" (OuterVolumeSpecName: "kube-api-access-jj67n") pod "9822e74c-ada1-4078-8969-5a4ec5af77af" (UID: "9822e74c-ada1-4078-8969-5a4ec5af77af"). InnerVolumeSpecName "kube-api-access-jj67n". PluginName "kubernetes.io/projected", VolumeGidValue "" Dec 13 02:11:52.143093 systemd[1]: var-lib-kubelet-pods-9822e74c\x2dada1\x2d4078\x2d8969\x2d5a4ec5af77af-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2djj67n.mount: Deactivated successfully. Dec 13 02:11:52.153590 kubelet[2032]: I1213 02:11:52.153527 2032 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/9822e74c-ada1-4078-8969-5a4ec5af77af-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "9822e74c-ada1-4078-8969-5a4ec5af77af" (UID: "9822e74c-ada1-4078-8969-5a4ec5af77af"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Dec 13 02:11:52.166236 systemd[1]: Started cri-containerd-72cff337df037b04bd84254baeca2cc2094de495bebab97129e1fff400d8f879.scope. Dec 13 02:11:52.229440 kubelet[2032]: I1213 02:11:52.229311 2032 reconciler_common.go:288] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/9822e74c-ada1-4078-8969-5a4ec5af77af-tigera-ca-bundle\") on node \"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 02:11:52.229440 kubelet[2032]: I1213 02:11:52.229360 2032 reconciler_common.go:288] "Volume detached for volume \"kube-api-access-jj67n\" (UniqueName: \"kubernetes.io/projected/9822e74c-ada1-4078-8969-5a4ec5af77af-kube-api-access-jj67n\") on node \"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 02:11:52.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.282000 audit: BPF prog-id=217 op=LOAD Dec 13 02:11:52.283000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.283000 audit[4589]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4581 pid=4589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:52.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732636666333337646630333762303462643834323534626165636132 Dec 13 02:11:52.284000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.284000 audit[4589]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4581 pid=4589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:52.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732636666333337646630333762303462643834323534626165636132 Dec 13 02:11:52.285000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.285000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.285000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.285000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.285000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.285000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.285000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.285000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.285000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.285000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.285000 audit: BPF prog-id=218 op=LOAD Dec 13 02:11:52.285000 audit[4589]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001912e0 items=0 ppid=4581 pid=4589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:52.285000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732636666333337646630333762303462643834323534626165636132 Dec 13 02:11:52.286000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.286000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.286000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.286000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.286000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.286000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.286000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.286000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.286000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.286000 audit: BPF prog-id=219 op=LOAD Dec 13 02:11:52.286000 audit[4589]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000191328 items=0 ppid=4581 pid=4589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:52.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732636666333337646630333762303462643834323534626165636132 Dec 13 02:11:52.286000 audit: BPF prog-id=219 op=UNLOAD Dec 13 02:11:52.286000 audit: BPF prog-id=218 op=UNLOAD Dec 13 02:11:52.286000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.286000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.286000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.286000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.286000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.286000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.286000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.286000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.286000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.286000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.286000 audit: BPF prog-id=220 op=LOAD Dec 13 02:11:52.286000 audit[4589]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000191738 items=0 ppid=4581 pid=4589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:52.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732636666333337646630333762303462643834323534626165636132 Dec 13 02:11:52.323875 env[1220]: time="2024-12-13T02:11:52.323799788Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-rzlbz,Uid:c55b3c83-e489-47e2-a4be-300aa934e420,Namespace:calico-system,Attempt:0,} returns sandbox id \"72cff337df037b04bd84254baeca2cc2094de495bebab97129e1fff400d8f879\"" Dec 13 02:11:52.328029 sshd[4521]: pam_unix(sshd:session): session closed for user core Dec 13 02:11:52.328529 env[1220]: time="2024-12-13T02:11:52.328485579Z" level=info msg="CreateContainer within sandbox \"72cff337df037b04bd84254baeca2cc2094de495bebab97129e1fff400d8f879\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 02:11:52.329000 audit[4521]: USER_END pid=4521 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:11:52.329000 audit[4521]: CRED_DISP pid=4521 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:11:52.332000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.74:22-139.178.68.195:54708 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:11:52.333098 systemd[1]: sshd@8-10.128.0.74:22-139.178.68.195:54708.service: Deactivated successfully. Dec 13 02:11:52.334383 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 02:11:52.337605 systemd-logind[1211]: Session 8 logged out. Waiting for processes to exit. Dec 13 02:11:52.339411 systemd-logind[1211]: Removed session 8. Dec 13 02:11:52.367596 env[1220]: time="2024-12-13T02:11:52.367516341Z" level=info msg="CreateContainer within sandbox \"72cff337df037b04bd84254baeca2cc2094de495bebab97129e1fff400d8f879\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"61ce21987b429743744d06e4f5ce61f7098135cf5018149b952b6f01edd675b3\"" Dec 13 02:11:52.368655 env[1220]: time="2024-12-13T02:11:52.368615305Z" level=info msg="StartContainer for \"61ce21987b429743744d06e4f5ce61f7098135cf5018149b952b6f01edd675b3\"" Dec 13 02:11:52.399032 systemd[1]: Started cri-containerd-61ce21987b429743744d06e4f5ce61f7098135cf5018149b952b6f01edd675b3.scope. Dec 13 02:11:52.449000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.449000 audit[4625]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f52d97e8518 items=0 ppid=4581 pid=4625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:52.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631636532313938376234323937343337343464303665346635636536 Dec 13 02:11:52.449000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.449000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.449000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.449000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.449000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.449000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.449000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.449000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.449000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.449000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.449000 audit: BPF prog-id=221 op=LOAD Dec 13 02:11:52.449000 audit[4625]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000259b98 items=0 ppid=4581 pid=4625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:52.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631636532313938376234323937343337343464303665346635636536 Dec 13 02:11:52.449000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.449000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.449000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.449000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.449000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.449000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.449000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.449000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.449000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.449000 audit: BPF prog-id=222 op=LOAD Dec 13 02:11:52.449000 audit[4625]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000259be8 items=0 ppid=4581 pid=4625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:52.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631636532313938376234323937343337343464303665346635636536 Dec 13 02:11:52.449000 audit: BPF prog-id=222 op=UNLOAD Dec 13 02:11:52.449000 audit: BPF prog-id=221 op=UNLOAD Dec 13 02:11:52.449000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.449000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.449000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.449000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.449000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.449000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.449000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.449000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.449000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.449000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:52.449000 audit: BPF prog-id=223 op=LOAD Dec 13 02:11:52.449000 audit[4625]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000259c78 items=0 ppid=4581 pid=4625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:52.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631636532313938376234323937343337343464303665346635636536 Dec 13 02:11:52.478901 env[1220]: time="2024-12-13T02:11:52.478848739Z" level=info msg="StartContainer for \"61ce21987b429743744d06e4f5ce61f7098135cf5018149b952b6f01edd675b3\" returns successfully" Dec 13 02:11:52.505123 systemd[1]: cri-containerd-61ce21987b429743744d06e4f5ce61f7098135cf5018149b952b6f01edd675b3.scope: Deactivated successfully. Dec 13 02:11:52.508000 audit: BPF prog-id=223 op=UNLOAD Dec 13 02:11:52.566388 env[1220]: time="2024-12-13T02:11:52.564105078Z" level=info msg="shim disconnected" id=61ce21987b429743744d06e4f5ce61f7098135cf5018149b952b6f01edd675b3 Dec 13 02:11:52.566388 env[1220]: time="2024-12-13T02:11:52.564185506Z" level=warning msg="cleaning up after shim disconnected" id=61ce21987b429743744d06e4f5ce61f7098135cf5018149b952b6f01edd675b3 namespace=k8s.io Dec 13 02:11:52.566388 env[1220]: time="2024-12-13T02:11:52.564202451Z" level=info msg="cleaning up dead shim" Dec 13 02:11:52.586688 env[1220]: time="2024-12-13T02:11:52.586607788Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:11:52Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4663 runtime=io.containerd.runc.v2\n" Dec 13 02:11:52.766000 audit[4676]: NETFILTER_CFG table=filter:125 family=2 entries=10 op=nft_register_rule pid=4676 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:11:52.766000 audit[4676]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffdb2781470 a2=0 a3=7ffdb278145c items=0 ppid=2179 pid=4676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:52.766000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:11:52.773000 audit[4676]: NETFILTER_CFG table=nat:126 family=2 entries=20 op=nft_register_rule pid=4676 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:11:52.773000 audit[4676]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffdb2781470 a2=0 a3=7ffdb278145c items=0 ppid=2179 pid=4676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:52.773000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:11:52.905221 env[1220]: time="2024-12-13T02:11:52.905158313Z" level=info msg="CreateContainer within sandbox \"72cff337df037b04bd84254baeca2cc2094de495bebab97129e1fff400d8f879\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 02:11:52.911549 systemd[1]: Removed slice kubepods-besteffort-pod9822e74c_ada1_4078_8969_5a4ec5af77af.slice. Dec 13 02:11:52.928890 env[1220]: time="2024-12-13T02:11:52.928826100Z" level=info msg="CreateContainer within sandbox \"72cff337df037b04bd84254baeca2cc2094de495bebab97129e1fff400d8f879\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"05d84d8f0d400f204eb85f533d071d463dd5727fb52838eb78541ca075198618\"" Dec 13 02:11:52.930111 env[1220]: time="2024-12-13T02:11:52.930065044Z" level=info msg="StartContainer for \"05d84d8f0d400f204eb85f533d071d463dd5727fb52838eb78541ca075198618\"" Dec 13 02:11:52.972195 systemd[1]: Started cri-containerd-05d84d8f0d400f204eb85f533d071d463dd5727fb52838eb78541ca075198618.scope. Dec 13 02:11:53.022894 systemd[1]: var-lib-kubelet-pods-9822e74c\x2dada1\x2d4078\x2d8969\x2d5a4ec5af77af-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dkube\x2dcontrollers-1.mount: Deactivated successfully. Dec 13 02:11:53.061000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:53.061000 audit[4685]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f5e48ca0be8 items=0 ppid=4581 pid=4685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:53.061000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035643834643866306434303066323034656238356635333364303731 Dec 13 02:11:53.062000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:53.062000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:53.062000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:53.062000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:53.062000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:53.062000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:53.062000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:53.062000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:53.062000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:53.062000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:53.062000 audit: BPF prog-id=224 op=LOAD Dec 13 02:11:53.062000 audit[4685]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000349b88 items=0 ppid=4581 pid=4685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:53.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035643834643866306434303066323034656238356635333364303731 Dec 13 02:11:53.063000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:53.063000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:53.063000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:53.063000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:53.063000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:53.063000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:53.063000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:53.063000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:53.063000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:53.063000 audit: BPF prog-id=225 op=LOAD Dec 13 02:11:53.063000 audit[4685]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000349bd8 items=0 ppid=4581 pid=4685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:53.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035643834643866306434303066323034656238356635333364303731 Dec 13 02:11:53.063000 audit: BPF prog-id=225 op=UNLOAD Dec 13 02:11:53.063000 audit: BPF prog-id=224 op=UNLOAD Dec 13 02:11:53.063000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:53.063000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:53.063000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:53.063000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:53.063000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:53.063000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:53.063000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:53.063000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:53.063000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:53.063000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:53.063000 audit: BPF prog-id=226 op=LOAD Dec 13 02:11:53.063000 audit[4685]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000349c68 items=0 ppid=4581 pid=4685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:53.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035643834643866306434303066323034656238356635333364303731 Dec 13 02:11:53.087306 env[1220]: time="2024-12-13T02:11:53.087235417Z" level=info msg="StartContainer for \"05d84d8f0d400f204eb85f533d071d463dd5727fb52838eb78541ca075198618\" returns successfully" Dec 13 02:11:53.553688 kubelet[2032]: I1213 02:11:53.553637 2032 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="12da52d6-ae60-4220-8891-d93eb2e8d034" path="/var/lib/kubelet/pods/12da52d6-ae60-4220-8891-d93eb2e8d034/volumes" Dec 13 02:11:53.555822 kubelet[2032]: I1213 02:11:53.555790 2032 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="4b6c34b4-cbf1-4a62-9b60-e4dbe333d317" path="/var/lib/kubelet/pods/4b6c34b4-cbf1-4a62-9b60-e4dbe333d317/volumes" Dec 13 02:11:53.556709 kubelet[2032]: I1213 02:11:53.556681 2032 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="9822e74c-ada1-4078-8969-5a4ec5af77af" path="/var/lib/kubelet/pods/9822e74c-ada1-4078-8969-5a4ec5af77af/volumes" Dec 13 02:11:53.588413 kubelet[2032]: I1213 02:11:53.588372 2032 scope.go:117] "RemoveContainer" containerID="3828e015e9131383d7316db205f2c6bc3463c58182ec730597a6213154ef47e0" Dec 13 02:11:53.590384 env[1220]: time="2024-12-13T02:11:53.590337528Z" level=info msg="RemoveContainer for \"3828e015e9131383d7316db205f2c6bc3463c58182ec730597a6213154ef47e0\"" Dec 13 02:11:53.596031 env[1220]: time="2024-12-13T02:11:53.595979434Z" level=info msg="RemoveContainer for \"3828e015e9131383d7316db205f2c6bc3463c58182ec730597a6213154ef47e0\" returns successfully" Dec 13 02:11:53.598317 env[1220]: time="2024-12-13T02:11:53.598278683Z" level=info msg="StopPodSandbox for \"db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4\"" Dec 13 02:11:53.792339 env[1220]: 2024-12-13 02:11:53.711 [WARNING][4732] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--4qxgx-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"38e5368d-879b-4625-afd4-c27aa522644e", ResourceVersion:"868", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 11, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal", ContainerID:"b9048da2eacd9d23c945c28b520aa124c132a8792f6c668d7314d9ecdfb65a60", Pod:"coredns-6f6b679f8f-4qxgx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.99.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4fb333717a5", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:11:53.792339 env[1220]: 2024-12-13 02:11:53.711 [INFO][4732] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4" Dec 13 02:11:53.792339 env[1220]: 2024-12-13 02:11:53.711 [INFO][4732] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4" iface="eth0" netns="" Dec 13 02:11:53.792339 env[1220]: 2024-12-13 02:11:53.711 [INFO][4732] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4" Dec 13 02:11:53.792339 env[1220]: 2024-12-13 02:11:53.711 [INFO][4732] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4" Dec 13 02:11:53.792339 env[1220]: 2024-12-13 02:11:53.775 [INFO][4738] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4" HandleID="k8s-pod-network.db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--4qxgx-eth0" Dec 13 02:11:53.792339 env[1220]: 2024-12-13 02:11:53.775 [INFO][4738] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:11:53.792339 env[1220]: 2024-12-13 02:11:53.775 [INFO][4738] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:11:53.792339 env[1220]: 2024-12-13 02:11:53.785 [WARNING][4738] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4" HandleID="k8s-pod-network.db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--4qxgx-eth0" Dec 13 02:11:53.792339 env[1220]: 2024-12-13 02:11:53.785 [INFO][4738] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4" HandleID="k8s-pod-network.db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--4qxgx-eth0" Dec 13 02:11:53.792339 env[1220]: 2024-12-13 02:11:53.789 [INFO][4738] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:11:53.792339 env[1220]: 2024-12-13 02:11:53.790 [INFO][4732] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4" Dec 13 02:11:53.793548 env[1220]: time="2024-12-13T02:11:53.793493161Z" level=info msg="TearDown network for sandbox \"db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4\" successfully" Dec 13 02:11:53.793766 env[1220]: time="2024-12-13T02:11:53.793726527Z" level=info msg="StopPodSandbox for \"db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4\" returns successfully" Dec 13 02:11:53.795208 env[1220]: time="2024-12-13T02:11:53.795159729Z" level=info msg="RemovePodSandbox for \"db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4\"" Dec 13 02:11:53.795334 env[1220]: time="2024-12-13T02:11:53.795222625Z" level=info msg="Forcibly stopping sandbox \"db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4\"" Dec 13 02:11:54.036638 env[1220]: 2024-12-13 02:11:53.887 [WARNING][4757] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--4qxgx-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"38e5368d-879b-4625-afd4-c27aa522644e", ResourceVersion:"868", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 11, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal", ContainerID:"b9048da2eacd9d23c945c28b520aa124c132a8792f6c668d7314d9ecdfb65a60", Pod:"coredns-6f6b679f8f-4qxgx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.99.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4fb333717a5", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:11:54.036638 env[1220]: 2024-12-13 02:11:53.891 [INFO][4757] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4" Dec 13 02:11:54.036638 env[1220]: 2024-12-13 02:11:53.891 [INFO][4757] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4" iface="eth0" netns="" Dec 13 02:11:54.036638 env[1220]: 2024-12-13 02:11:53.891 [INFO][4757] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4" Dec 13 02:11:54.036638 env[1220]: 2024-12-13 02:11:53.891 [INFO][4757] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4" Dec 13 02:11:54.036638 env[1220]: 2024-12-13 02:11:54.017 [INFO][4765] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4" HandleID="k8s-pod-network.db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--4qxgx-eth0" Dec 13 02:11:54.036638 env[1220]: 2024-12-13 02:11:54.017 [INFO][4765] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:11:54.036638 env[1220]: 2024-12-13 02:11:54.017 [INFO][4765] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:11:54.036638 env[1220]: 2024-12-13 02:11:54.029 [WARNING][4765] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4" HandleID="k8s-pod-network.db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--4qxgx-eth0" Dec 13 02:11:54.036638 env[1220]: 2024-12-13 02:11:54.029 [INFO][4765] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4" HandleID="k8s-pod-network.db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--4qxgx-eth0" Dec 13 02:11:54.036638 env[1220]: 2024-12-13 02:11:54.033 [INFO][4765] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:11:54.036638 env[1220]: 2024-12-13 02:11:54.034 [INFO][4757] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4" Dec 13 02:11:54.037539 env[1220]: time="2024-12-13T02:11:54.036679066Z" level=info msg="TearDown network for sandbox \"db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4\" successfully" Dec 13 02:11:54.043449 env[1220]: time="2024-12-13T02:11:54.043334685Z" level=info msg="RemovePodSandbox \"db5ed079acf27b8fdf13bcdbe7324b5ecde882d72536510d60c269e959a1d2b4\" returns successfully" Dec 13 02:11:54.044428 env[1220]: time="2024-12-13T02:11:54.044385138Z" level=info msg="StopPodSandbox for \"1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95\"" Dec 13 02:11:54.271309 env[1220]: 2024-12-13 02:11:54.173 [WARNING][4786] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--q8jtg-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"ec6f24db-6064-4eab-a0e1-277f9824d7e5", ResourceVersion:"829", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 11, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal", ContainerID:"66ede33efc9295b6ea1c2c1c23814eb71dbea440ecd3ec5fab4a818d44bba818", Pod:"coredns-6f6b679f8f-q8jtg", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.99.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0ae47e793ae", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:11:54.271309 env[1220]: 2024-12-13 02:11:54.174 [INFO][4786] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95" Dec 13 02:11:54.271309 env[1220]: 2024-12-13 02:11:54.174 [INFO][4786] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95" iface="eth0" netns="" Dec 13 02:11:54.271309 env[1220]: 2024-12-13 02:11:54.174 [INFO][4786] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95" Dec 13 02:11:54.271309 env[1220]: 2024-12-13 02:11:54.174 [INFO][4786] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95" Dec 13 02:11:54.271309 env[1220]: 2024-12-13 02:11:54.238 [INFO][4792] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95" HandleID="k8s-pod-network.1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--q8jtg-eth0" Dec 13 02:11:54.271309 env[1220]: 2024-12-13 02:11:54.238 [INFO][4792] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:11:54.271309 env[1220]: 2024-12-13 02:11:54.238 [INFO][4792] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:11:54.271309 env[1220]: 2024-12-13 02:11:54.260 [WARNING][4792] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95" HandleID="k8s-pod-network.1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--q8jtg-eth0" Dec 13 02:11:54.271309 env[1220]: 2024-12-13 02:11:54.260 [INFO][4792] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95" HandleID="k8s-pod-network.1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--q8jtg-eth0" Dec 13 02:11:54.271309 env[1220]: 2024-12-13 02:11:54.268 [INFO][4792] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:11:54.271309 env[1220]: 2024-12-13 02:11:54.269 [INFO][4786] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95" Dec 13 02:11:54.272579 env[1220]: time="2024-12-13T02:11:54.271355422Z" level=info msg="TearDown network for sandbox \"1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95\" successfully" Dec 13 02:11:54.272579 env[1220]: time="2024-12-13T02:11:54.271404118Z" level=info msg="StopPodSandbox for \"1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95\" returns successfully" Dec 13 02:11:54.272579 env[1220]: time="2024-12-13T02:11:54.272044016Z" level=info msg="RemovePodSandbox for \"1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95\"" Dec 13 02:11:54.272579 env[1220]: time="2024-12-13T02:11:54.272088115Z" level=info msg="Forcibly stopping sandbox \"1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95\"" Dec 13 02:11:54.464819 env[1220]: 2024-12-13 02:11:54.374 [WARNING][4812] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--q8jtg-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"ec6f24db-6064-4eab-a0e1-277f9824d7e5", ResourceVersion:"829", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 11, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal", ContainerID:"66ede33efc9295b6ea1c2c1c23814eb71dbea440ecd3ec5fab4a818d44bba818", Pod:"coredns-6f6b679f8f-q8jtg", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.99.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0ae47e793ae", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:11:54.464819 env[1220]: 2024-12-13 02:11:54.375 [INFO][4812] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95" Dec 13 02:11:54.464819 env[1220]: 2024-12-13 02:11:54.375 [INFO][4812] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95" iface="eth0" netns="" Dec 13 02:11:54.464819 env[1220]: 2024-12-13 02:11:54.375 [INFO][4812] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95" Dec 13 02:11:54.464819 env[1220]: 2024-12-13 02:11:54.375 [INFO][4812] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95" Dec 13 02:11:54.464819 env[1220]: 2024-12-13 02:11:54.437 [INFO][4818] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95" HandleID="k8s-pod-network.1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--q8jtg-eth0" Dec 13 02:11:54.464819 env[1220]: 2024-12-13 02:11:54.437 [INFO][4818] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:11:54.464819 env[1220]: 2024-12-13 02:11:54.437 [INFO][4818] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:11:54.464819 env[1220]: 2024-12-13 02:11:54.456 [WARNING][4818] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95" HandleID="k8s-pod-network.1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--q8jtg-eth0" Dec 13 02:11:54.464819 env[1220]: 2024-12-13 02:11:54.456 [INFO][4818] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95" HandleID="k8s-pod-network.1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--q8jtg-eth0" Dec 13 02:11:54.464819 env[1220]: 2024-12-13 02:11:54.461 [INFO][4818] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:11:54.464819 env[1220]: 2024-12-13 02:11:54.463 [INFO][4812] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95" Dec 13 02:11:54.465716 env[1220]: time="2024-12-13T02:11:54.464850613Z" level=info msg="TearDown network for sandbox \"1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95\" successfully" Dec 13 02:11:54.469958 env[1220]: time="2024-12-13T02:11:54.469886885Z" level=info msg="RemovePodSandbox \"1066df7b1bfab5fff3761b6d41ec2a436cf4790c1c8c4b3433db3ef755233d95\" returns successfully" Dec 13 02:11:54.470673 env[1220]: time="2024-12-13T02:11:54.470622433Z" level=info msg="StopPodSandbox for \"bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d\"" Dec 13 02:11:54.607821 systemd[1]: cri-containerd-05d84d8f0d400f204eb85f533d071d463dd5727fb52838eb78541ca075198618.scope: Deactivated successfully. Dec 13 02:11:54.608000 audit: BPF prog-id=226 op=UNLOAD Dec 13 02:11:54.636246 env[1220]: 2024-12-13 02:11:54.560 [WARNING][4836] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--t9c25-eth0", GenerateName:"calico-apiserver-7589d484d8-", Namespace:"calico-apiserver", SelfLink:"", UID:"7c7a4d1e-cded-4c6b-9d19-1c05bd20a799", ResourceVersion:"878", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 11, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7589d484d8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal", ContainerID:"a6d3681dd35197138d7e5db2e03fc4add16132fb07942cce53c7f456dfa7a292", Pod:"calico-apiserver-7589d484d8-t9c25", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.99.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6bcbabe17ce", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:11:54.636246 env[1220]: 2024-12-13 02:11:54.561 [INFO][4836] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d" Dec 13 02:11:54.636246 env[1220]: 2024-12-13 02:11:54.561 [INFO][4836] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d" iface="eth0" netns="" Dec 13 02:11:54.636246 env[1220]: 2024-12-13 02:11:54.561 [INFO][4836] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d" Dec 13 02:11:54.636246 env[1220]: 2024-12-13 02:11:54.561 [INFO][4836] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d" Dec 13 02:11:54.636246 env[1220]: 2024-12-13 02:11:54.605 [INFO][4842] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d" HandleID="k8s-pod-network.bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--t9c25-eth0" Dec 13 02:11:54.636246 env[1220]: 2024-12-13 02:11:54.606 [INFO][4842] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:11:54.636246 env[1220]: 2024-12-13 02:11:54.606 [INFO][4842] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:11:54.636246 env[1220]: 2024-12-13 02:11:54.628 [WARNING][4842] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d" HandleID="k8s-pod-network.bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--t9c25-eth0" Dec 13 02:11:54.636246 env[1220]: 2024-12-13 02:11:54.628 [INFO][4842] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d" HandleID="k8s-pod-network.bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--t9c25-eth0" Dec 13 02:11:54.636246 env[1220]: 2024-12-13 02:11:54.630 [INFO][4842] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:11:54.636246 env[1220]: 2024-12-13 02:11:54.633 [INFO][4836] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d" Dec 13 02:11:54.637196 env[1220]: time="2024-12-13T02:11:54.636296012Z" level=info msg="TearDown network for sandbox \"bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d\" successfully" Dec 13 02:11:54.637196 env[1220]: time="2024-12-13T02:11:54.636336241Z" level=info msg="StopPodSandbox for \"bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d\" returns successfully" Dec 13 02:11:54.637918 env[1220]: time="2024-12-13T02:11:54.637878710Z" level=info msg="RemovePodSandbox for \"bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d\"" Dec 13 02:11:54.638165 env[1220]: time="2024-12-13T02:11:54.638094103Z" level=info msg="Forcibly stopping sandbox \"bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d\"" Dec 13 02:11:54.661149 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-05d84d8f0d400f204eb85f533d071d463dd5727fb52838eb78541ca075198618-rootfs.mount: Deactivated successfully. Dec 13 02:11:54.673235 env[1220]: time="2024-12-13T02:11:54.673145230Z" level=info msg="shim disconnected" id=05d84d8f0d400f204eb85f533d071d463dd5727fb52838eb78541ca075198618 Dec 13 02:11:54.673235 env[1220]: time="2024-12-13T02:11:54.673240563Z" level=warning msg="cleaning up after shim disconnected" id=05d84d8f0d400f204eb85f533d071d463dd5727fb52838eb78541ca075198618 namespace=k8s.io Dec 13 02:11:54.673659 env[1220]: time="2024-12-13T02:11:54.673258623Z" level=info msg="cleaning up dead shim" Dec 13 02:11:54.775011 env[1220]: time="2024-12-13T02:11:54.774788060Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:11:54Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4882 runtime=io.containerd.runc.v2\n" Dec 13 02:11:54.920869 env[1220]: 2024-12-13 02:11:54.831 [WARNING][4877] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--t9c25-eth0", GenerateName:"calico-apiserver-7589d484d8-", Namespace:"calico-apiserver", SelfLink:"", UID:"7c7a4d1e-cded-4c6b-9d19-1c05bd20a799", ResourceVersion:"878", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 11, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7589d484d8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal", ContainerID:"a6d3681dd35197138d7e5db2e03fc4add16132fb07942cce53c7f456dfa7a292", Pod:"calico-apiserver-7589d484d8-t9c25", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.99.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6bcbabe17ce", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:11:54.920869 env[1220]: 2024-12-13 02:11:54.832 [INFO][4877] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d" Dec 13 02:11:54.920869 env[1220]: 2024-12-13 02:11:54.832 [INFO][4877] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d" iface="eth0" netns="" Dec 13 02:11:54.920869 env[1220]: 2024-12-13 02:11:54.832 [INFO][4877] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d" Dec 13 02:11:54.920869 env[1220]: 2024-12-13 02:11:54.832 [INFO][4877] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d" Dec 13 02:11:54.920869 env[1220]: 2024-12-13 02:11:54.894 [INFO][4896] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d" HandleID="k8s-pod-network.bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--t9c25-eth0" Dec 13 02:11:54.920869 env[1220]: 2024-12-13 02:11:54.895 [INFO][4896] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:11:54.920869 env[1220]: 2024-12-13 02:11:54.895 [INFO][4896] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:11:54.920869 env[1220]: 2024-12-13 02:11:54.908 [WARNING][4896] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d" HandleID="k8s-pod-network.bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--t9c25-eth0" Dec 13 02:11:54.920869 env[1220]: 2024-12-13 02:11:54.908 [INFO][4896] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d" HandleID="k8s-pod-network.bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--t9c25-eth0" Dec 13 02:11:54.920869 env[1220]: 2024-12-13 02:11:54.916 [INFO][4896] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:11:54.920869 env[1220]: 2024-12-13 02:11:54.918 [INFO][4877] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d" Dec 13 02:11:54.921788 env[1220]: time="2024-12-13T02:11:54.920917508Z" level=info msg="TearDown network for sandbox \"bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d\" successfully" Dec 13 02:11:54.926334 env[1220]: time="2024-12-13T02:11:54.926225877Z" level=info msg="RemovePodSandbox \"bc8ab05c265a960e2f5b3983515a4dad9530f1f6d5633562f98e84e1b570bd9d\" returns successfully" Dec 13 02:11:54.927131 env[1220]: time="2024-12-13T02:11:54.927067742Z" level=info msg="StopPodSandbox for \"45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e\"" Dec 13 02:11:54.976359 env[1220]: time="2024-12-13T02:11:54.976278452Z" level=info msg="CreateContainer within sandbox \"72cff337df037b04bd84254baeca2cc2094de495bebab97129e1fff400d8f879\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 02:11:55.005126 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1646047792.mount: Deactivated successfully. Dec 13 02:11:55.018388 env[1220]: time="2024-12-13T02:11:55.018323782Z" level=info msg="CreateContainer within sandbox \"72cff337df037b04bd84254baeca2cc2094de495bebab97129e1fff400d8f879\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"03a167270979fe02c4e4978919996a1c898f440300afbc066b151c30d9b934ff\"" Dec 13 02:11:55.020607 env[1220]: time="2024-12-13T02:11:55.019515504Z" level=info msg="StartContainer for \"03a167270979fe02c4e4978919996a1c898f440300afbc066b151c30d9b934ff\"" Dec 13 02:11:55.070678 systemd[1]: Started cri-containerd-03a167270979fe02c4e4978919996a1c898f440300afbc066b151c30d9b934ff.scope. Dec 13 02:11:55.161663 env[1220]: 2024-12-13 02:11:55.087 [WARNING][4916] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-csi--node--driver--8brk9-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f4842bfe-3151-4850-b245-0e4d809afe99", ResourceVersion:"915", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 11, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal", ContainerID:"37042aafd5c0db236d15b8634e07996609f39f98acb2bfd95aba16f3b181349c", Pod:"csi-node-driver-8brk9", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.99.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calif014495a59d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:11:55.161663 env[1220]: 2024-12-13 02:11:55.087 [INFO][4916] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e" Dec 13 02:11:55.161663 env[1220]: 2024-12-13 02:11:55.087 [INFO][4916] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e" iface="eth0" netns="" Dec 13 02:11:55.161663 env[1220]: 2024-12-13 02:11:55.087 [INFO][4916] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e" Dec 13 02:11:55.161663 env[1220]: 2024-12-13 02:11:55.088 [INFO][4916] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e" Dec 13 02:11:55.161663 env[1220]: 2024-12-13 02:11:55.143 [INFO][4939] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e" HandleID="k8s-pod-network.45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-csi--node--driver--8brk9-eth0" Dec 13 02:11:55.161663 env[1220]: 2024-12-13 02:11:55.144 [INFO][4939] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:11:55.161663 env[1220]: 2024-12-13 02:11:55.144 [INFO][4939] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:11:55.161663 env[1220]: 2024-12-13 02:11:55.153 [WARNING][4939] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e" HandleID="k8s-pod-network.45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-csi--node--driver--8brk9-eth0" Dec 13 02:11:55.161663 env[1220]: 2024-12-13 02:11:55.153 [INFO][4939] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e" HandleID="k8s-pod-network.45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-csi--node--driver--8brk9-eth0" Dec 13 02:11:55.161663 env[1220]: 2024-12-13 02:11:55.158 [INFO][4939] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:11:55.161663 env[1220]: 2024-12-13 02:11:55.159 [INFO][4916] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e" Dec 13 02:11:55.162720 env[1220]: time="2024-12-13T02:11:55.162666221Z" level=info msg="TearDown network for sandbox \"45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e\" successfully" Dec 13 02:11:55.162864 env[1220]: time="2024-12-13T02:11:55.162834510Z" level=info msg="StopPodSandbox for \"45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e\" returns successfully" Dec 13 02:11:55.163672 env[1220]: time="2024-12-13T02:11:55.163633398Z" level=info msg="RemovePodSandbox for \"45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e\"" Dec 13 02:11:55.163898 env[1220]: time="2024-12-13T02:11:55.163837772Z" level=info msg="Forcibly stopping sandbox \"45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e\"" Dec 13 02:11:55.170000 audit[4927]: AVC avc: denied { perfmon } for pid=4927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:55.170000 audit[4927]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f98253bcc38 items=0 ppid=4581 pid=4927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:55.170000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033613136373237303937396665303263346534393738393139393936 Dec 13 02:11:55.171000 audit[4927]: AVC avc: denied { bpf } for pid=4927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:55.171000 audit[4927]: AVC avc: denied { bpf } for pid=4927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:55.171000 audit[4927]: AVC avc: denied { bpf } for pid=4927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:55.171000 audit[4927]: AVC avc: denied { perfmon } for pid=4927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:55.171000 audit[4927]: AVC avc: denied { perfmon } for pid=4927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:55.171000 audit[4927]: AVC avc: denied { perfmon } for pid=4927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:55.171000 audit[4927]: AVC avc: denied { perfmon } for pid=4927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:55.171000 audit[4927]: AVC avc: denied { perfmon } for pid=4927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:55.171000 audit[4927]: AVC avc: denied { bpf } for pid=4927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:55.171000 audit[4927]: AVC avc: denied { bpf } for pid=4927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:55.171000 audit: BPF prog-id=227 op=LOAD Dec 13 02:11:55.171000 audit[4927]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00030c088 items=0 ppid=4581 pid=4927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:55.171000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033613136373237303937396665303263346534393738393139393936 Dec 13 02:11:55.172000 audit[4927]: AVC avc: denied { bpf } for pid=4927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:55.172000 audit[4927]: AVC avc: denied { bpf } for pid=4927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:55.172000 audit[4927]: AVC avc: denied { perfmon } for pid=4927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:55.172000 audit[4927]: AVC avc: denied { perfmon } for pid=4927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:55.172000 audit[4927]: AVC avc: denied { perfmon } for pid=4927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:55.172000 audit[4927]: AVC avc: denied { perfmon } for pid=4927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:55.172000 audit[4927]: AVC avc: denied { perfmon } for pid=4927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:55.172000 audit[4927]: AVC avc: denied { bpf } for pid=4927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:55.172000 audit[4927]: AVC avc: denied { bpf } for pid=4927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:55.172000 audit: BPF prog-id=228 op=LOAD Dec 13 02:11:55.172000 audit[4927]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00030c0d8 items=0 ppid=4581 pid=4927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:55.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033613136373237303937396665303263346534393738393139393936 Dec 13 02:11:55.173000 audit: BPF prog-id=228 op=UNLOAD Dec 13 02:11:55.173000 audit: BPF prog-id=227 op=UNLOAD Dec 13 02:11:55.173000 audit[4927]: AVC avc: denied { bpf } for pid=4927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:55.173000 audit[4927]: AVC avc: denied { bpf } for pid=4927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:55.173000 audit[4927]: AVC avc: denied { bpf } for pid=4927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:55.173000 audit[4927]: AVC avc: denied { perfmon } for pid=4927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:55.173000 audit[4927]: AVC avc: denied { perfmon } for pid=4927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:55.173000 audit[4927]: AVC avc: denied { perfmon } for pid=4927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:55.173000 audit[4927]: AVC avc: denied { perfmon } for pid=4927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:55.173000 audit[4927]: AVC avc: denied { perfmon } for pid=4927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:55.173000 audit[4927]: AVC avc: denied { bpf } for pid=4927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:55.173000 audit[4927]: AVC avc: denied { bpf } for pid=4927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:55.173000 audit: BPF prog-id=229 op=LOAD Dec 13 02:11:55.173000 audit[4927]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00030c168 items=0 ppid=4581 pid=4927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:55.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033613136373237303937396665303263346534393738393139393936 Dec 13 02:11:55.213985 env[1220]: time="2024-12-13T02:11:55.213929123Z" level=info msg="StartContainer for \"03a167270979fe02c4e4978919996a1c898f440300afbc066b151c30d9b934ff\" returns successfully" Dec 13 02:11:55.387677 env[1220]: 2024-12-13 02:11:55.289 [WARNING][4975] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-csi--node--driver--8brk9-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f4842bfe-3151-4850-b245-0e4d809afe99", ResourceVersion:"915", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 11, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal", ContainerID:"37042aafd5c0db236d15b8634e07996609f39f98acb2bfd95aba16f3b181349c", Pod:"csi-node-driver-8brk9", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.99.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calif014495a59d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:11:55.387677 env[1220]: 2024-12-13 02:11:55.289 [INFO][4975] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e" Dec 13 02:11:55.387677 env[1220]: 2024-12-13 02:11:55.289 [INFO][4975] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e" iface="eth0" netns="" Dec 13 02:11:55.387677 env[1220]: 2024-12-13 02:11:55.289 [INFO][4975] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e" Dec 13 02:11:55.387677 env[1220]: 2024-12-13 02:11:55.289 [INFO][4975] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e" Dec 13 02:11:55.387677 env[1220]: 2024-12-13 02:11:55.357 [INFO][4990] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e" HandleID="k8s-pod-network.45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-csi--node--driver--8brk9-eth0" Dec 13 02:11:55.387677 env[1220]: 2024-12-13 02:11:55.357 [INFO][4990] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:11:55.387677 env[1220]: 2024-12-13 02:11:55.357 [INFO][4990] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:11:55.387677 env[1220]: 2024-12-13 02:11:55.379 [WARNING][4990] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e" HandleID="k8s-pod-network.45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-csi--node--driver--8brk9-eth0" Dec 13 02:11:55.387677 env[1220]: 2024-12-13 02:11:55.379 [INFO][4990] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e" HandleID="k8s-pod-network.45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-csi--node--driver--8brk9-eth0" Dec 13 02:11:55.387677 env[1220]: 2024-12-13 02:11:55.381 [INFO][4990] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:11:55.387677 env[1220]: 2024-12-13 02:11:55.383 [INFO][4975] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e" Dec 13 02:11:55.387677 env[1220]: time="2024-12-13T02:11:55.385277543Z" level=info msg="TearDown network for sandbox \"45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e\" successfully" Dec 13 02:11:55.392991 env[1220]: time="2024-12-13T02:11:55.392915862Z" level=info msg="RemovePodSandbox \"45b890528e45096efb02cd4f55419ef9fe8d5950f76fdc14d96ab00891be1d6e\" returns successfully" Dec 13 02:11:55.393785 env[1220]: time="2024-12-13T02:11:55.393739962Z" level=info msg="StopPodSandbox for \"04eb8a1c240375ceae28c4d7d6ab09a026f57eb626ba647968a8ebdfa892c858\"" Dec 13 02:11:55.393933 env[1220]: time="2024-12-13T02:11:55.393872402Z" level=info msg="TearDown network for sandbox \"04eb8a1c240375ceae28c4d7d6ab09a026f57eb626ba647968a8ebdfa892c858\" successfully" Dec 13 02:11:55.394011 env[1220]: time="2024-12-13T02:11:55.393934685Z" level=info msg="StopPodSandbox for \"04eb8a1c240375ceae28c4d7d6ab09a026f57eb626ba647968a8ebdfa892c858\" returns successfully" Dec 13 02:11:55.394629 env[1220]: time="2024-12-13T02:11:55.394587812Z" level=info msg="RemovePodSandbox for \"04eb8a1c240375ceae28c4d7d6ab09a026f57eb626ba647968a8ebdfa892c858\"" Dec 13 02:11:55.394751 env[1220]: time="2024-12-13T02:11:55.394633771Z" level=info msg="Forcibly stopping sandbox \"04eb8a1c240375ceae28c4d7d6ab09a026f57eb626ba647968a8ebdfa892c858\"" Dec 13 02:11:55.394819 env[1220]: time="2024-12-13T02:11:55.394741724Z" level=info msg="TearDown network for sandbox \"04eb8a1c240375ceae28c4d7d6ab09a026f57eb626ba647968a8ebdfa892c858\" successfully" Dec 13 02:11:55.402883 env[1220]: time="2024-12-13T02:11:55.402244573Z" level=info msg="RemovePodSandbox \"04eb8a1c240375ceae28c4d7d6ab09a026f57eb626ba647968a8ebdfa892c858\" returns successfully" Dec 13 02:11:55.403435 env[1220]: time="2024-12-13T02:11:55.403395926Z" level=info msg="StopPodSandbox for \"21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf\"" Dec 13 02:11:55.565380 env[1220]: 2024-12-13 02:11:55.483 [WARNING][5011] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--nbqzv-eth0", GenerateName:"calico-apiserver-7589d484d8-", Namespace:"calico-apiserver", SelfLink:"", UID:"f5765683-2ccd-4f71-9c39-d946c348ae32", ResourceVersion:"972", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 11, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7589d484d8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal", ContainerID:"d9bc1e46ff3d4dce38ec8356146a5b75698e7229100f2e8e8ba76946092befff", Pod:"calico-apiserver-7589d484d8-nbqzv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.99.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8025f22c9b9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:11:55.565380 env[1220]: 2024-12-13 02:11:55.483 [INFO][5011] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf" Dec 13 02:11:55.565380 env[1220]: 2024-12-13 02:11:55.484 [INFO][5011] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf" iface="eth0" netns="" Dec 13 02:11:55.565380 env[1220]: 2024-12-13 02:11:55.484 [INFO][5011] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf" Dec 13 02:11:55.565380 env[1220]: 2024-12-13 02:11:55.484 [INFO][5011] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf" Dec 13 02:11:55.565380 env[1220]: 2024-12-13 02:11:55.530 [INFO][5018] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf" HandleID="k8s-pod-network.21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--nbqzv-eth0" Dec 13 02:11:55.565380 env[1220]: 2024-12-13 02:11:55.530 [INFO][5018] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:11:55.565380 env[1220]: 2024-12-13 02:11:55.531 [INFO][5018] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:11:55.565380 env[1220]: 2024-12-13 02:11:55.557 [WARNING][5018] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf" HandleID="k8s-pod-network.21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--nbqzv-eth0" Dec 13 02:11:55.565380 env[1220]: 2024-12-13 02:11:55.557 [INFO][5018] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf" HandleID="k8s-pod-network.21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--nbqzv-eth0" Dec 13 02:11:55.565380 env[1220]: 2024-12-13 02:11:55.560 [INFO][5018] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:11:55.565380 env[1220]: 2024-12-13 02:11:55.563 [INFO][5011] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf" Dec 13 02:11:55.566346 env[1220]: time="2024-12-13T02:11:55.565430575Z" level=info msg="TearDown network for sandbox \"21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf\" successfully" Dec 13 02:11:55.566346 env[1220]: time="2024-12-13T02:11:55.565474656Z" level=info msg="StopPodSandbox for \"21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf\" returns successfully" Dec 13 02:11:55.566346 env[1220]: time="2024-12-13T02:11:55.566078398Z" level=info msg="RemovePodSandbox for \"21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf\"" Dec 13 02:11:55.566346 env[1220]: time="2024-12-13T02:11:55.566122006Z" level=info msg="Forcibly stopping sandbox \"21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf\"" Dec 13 02:11:55.733358 env[1220]: 2024-12-13 02:11:55.654 [WARNING][5040] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--nbqzv-eth0", GenerateName:"calico-apiserver-7589d484d8-", Namespace:"calico-apiserver", SelfLink:"", UID:"f5765683-2ccd-4f71-9c39-d946c348ae32", ResourceVersion:"972", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 11, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7589d484d8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal", ContainerID:"d9bc1e46ff3d4dce38ec8356146a5b75698e7229100f2e8e8ba76946092befff", Pod:"calico-apiserver-7589d484d8-nbqzv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.99.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8025f22c9b9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:11:55.733358 env[1220]: 2024-12-13 02:11:55.655 [INFO][5040] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf" Dec 13 02:11:55.733358 env[1220]: 2024-12-13 02:11:55.655 [INFO][5040] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf" iface="eth0" netns="" Dec 13 02:11:55.733358 env[1220]: 2024-12-13 02:11:55.655 [INFO][5040] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf" Dec 13 02:11:55.733358 env[1220]: 2024-12-13 02:11:55.655 [INFO][5040] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf" Dec 13 02:11:55.733358 env[1220]: 2024-12-13 02:11:55.705 [INFO][5047] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf" HandleID="k8s-pod-network.21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--nbqzv-eth0" Dec 13 02:11:55.733358 env[1220]: 2024-12-13 02:11:55.705 [INFO][5047] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:11:55.733358 env[1220]: 2024-12-13 02:11:55.706 [INFO][5047] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:11:55.733358 env[1220]: 2024-12-13 02:11:55.723 [WARNING][5047] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf" HandleID="k8s-pod-network.21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--nbqzv-eth0" Dec 13 02:11:55.733358 env[1220]: 2024-12-13 02:11:55.726 [INFO][5047] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf" HandleID="k8s-pod-network.21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--apiserver--7589d484d8--nbqzv-eth0" Dec 13 02:11:55.733358 env[1220]: 2024-12-13 02:11:55.729 [INFO][5047] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:11:55.733358 env[1220]: 2024-12-13 02:11:55.731 [INFO][5040] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf" Dec 13 02:11:55.734330 env[1220]: time="2024-12-13T02:11:55.733390148Z" level=info msg="TearDown network for sandbox \"21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf\" successfully" Dec 13 02:11:55.738329 env[1220]: time="2024-12-13T02:11:55.738256061Z" level=info msg="RemovePodSandbox \"21485440d75a7103749804f678a3394dbd7320f5170732ff0080b129dd282fcf\" returns successfully" Dec 13 02:11:55.739139 env[1220]: time="2024-12-13T02:11:55.739097767Z" level=info msg="StopPodSandbox for \"f3e6dda92d7ffa46ca75e93f3904b2dca781160ac02cd308b41501c50cbdd61e\"" Dec 13 02:11:55.739275 env[1220]: time="2024-12-13T02:11:55.739223198Z" level=info msg="TearDown network for sandbox \"f3e6dda92d7ffa46ca75e93f3904b2dca781160ac02cd308b41501c50cbdd61e\" successfully" Dec 13 02:11:55.739371 env[1220]: time="2024-12-13T02:11:55.739277661Z" level=info msg="StopPodSandbox for \"f3e6dda92d7ffa46ca75e93f3904b2dca781160ac02cd308b41501c50cbdd61e\" returns successfully" Dec 13 02:11:55.739911 env[1220]: time="2024-12-13T02:11:55.739871493Z" level=info msg="RemovePodSandbox for \"f3e6dda92d7ffa46ca75e93f3904b2dca781160ac02cd308b41501c50cbdd61e\"" Dec 13 02:11:55.740048 env[1220]: time="2024-12-13T02:11:55.739918650Z" level=info msg="Forcibly stopping sandbox \"f3e6dda92d7ffa46ca75e93f3904b2dca781160ac02cd308b41501c50cbdd61e\"" Dec 13 02:11:55.740048 env[1220]: time="2024-12-13T02:11:55.740032887Z" level=info msg="TearDown network for sandbox \"f3e6dda92d7ffa46ca75e93f3904b2dca781160ac02cd308b41501c50cbdd61e\" successfully" Dec 13 02:11:55.745219 env[1220]: time="2024-12-13T02:11:55.745158427Z" level=info msg="RemovePodSandbox \"f3e6dda92d7ffa46ca75e93f3904b2dca781160ac02cd308b41501c50cbdd61e\" returns successfully" Dec 13 02:11:55.745990 env[1220]: time="2024-12-13T02:11:55.745946781Z" level=info msg="StopPodSandbox for \"87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729\"" Dec 13 02:11:55.791815 kubelet[2032]: E1213 02:11:55.791378 2032 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="9822e74c-ada1-4078-8969-5a4ec5af77af" containerName="calico-kube-controllers" Dec 13 02:11:55.791815 kubelet[2032]: I1213 02:11:55.791484 2032 memory_manager.go:354] "RemoveStaleState removing state" podUID="9822e74c-ada1-4078-8969-5a4ec5af77af" containerName="calico-kube-controllers" Dec 13 02:11:55.802163 systemd[1]: Created slice kubepods-besteffort-pod2d4619e8_f4c5_4739_8e31_b8a893278eb0.slice. Dec 13 02:11:55.868435 kubelet[2032]: I1213 02:11:55.868389 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/2d4619e8-f4c5-4739-8e31-b8a893278eb0-tigera-ca-bundle\") pod \"calico-kube-controllers-676dc55965-z9kjf\" (UID: \"2d4619e8-f4c5-4739-8e31-b8a893278eb0\") " pod="calico-system/calico-kube-controllers-676dc55965-z9kjf" Dec 13 02:11:55.868766 kubelet[2032]: I1213 02:11:55.868719 2032 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qwnsr\" (UniqueName: \"kubernetes.io/projected/2d4619e8-f4c5-4739-8e31-b8a893278eb0-kube-api-access-qwnsr\") pod \"calico-kube-controllers-676dc55965-z9kjf\" (UID: \"2d4619e8-f4c5-4739-8e31-b8a893278eb0\") " pod="calico-system/calico-kube-controllers-676dc55965-z9kjf" Dec 13 02:11:55.966627 env[1220]: 2024-12-13 02:11:55.880 [WARNING][5065] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--665858c48b--kkf7t-eth0" Dec 13 02:11:55.966627 env[1220]: 2024-12-13 02:11:55.880 [INFO][5065] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" Dec 13 02:11:55.966627 env[1220]: 2024-12-13 02:11:55.880 [INFO][5065] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" iface="eth0" netns="" Dec 13 02:11:55.966627 env[1220]: 2024-12-13 02:11:55.880 [INFO][5065] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" Dec 13 02:11:55.966627 env[1220]: 2024-12-13 02:11:55.880 [INFO][5065] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" Dec 13 02:11:55.966627 env[1220]: 2024-12-13 02:11:55.938 [INFO][5078] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" HandleID="k8s-pod-network.87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--665858c48b--kkf7t-eth0" Dec 13 02:11:55.966627 env[1220]: 2024-12-13 02:11:55.938 [INFO][5078] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:11:55.966627 env[1220]: 2024-12-13 02:11:55.938 [INFO][5078] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:11:55.966627 env[1220]: 2024-12-13 02:11:55.959 [WARNING][5078] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" HandleID="k8s-pod-network.87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--665858c48b--kkf7t-eth0" Dec 13 02:11:55.966627 env[1220]: 2024-12-13 02:11:55.959 [INFO][5078] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" HandleID="k8s-pod-network.87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--665858c48b--kkf7t-eth0" Dec 13 02:11:55.966627 env[1220]: 2024-12-13 02:11:55.963 [INFO][5078] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:11:55.966627 env[1220]: 2024-12-13 02:11:55.965 [INFO][5065] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" Dec 13 02:11:55.967610 env[1220]: time="2024-12-13T02:11:55.967531226Z" level=info msg="TearDown network for sandbox \"87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729\" successfully" Dec 13 02:11:55.967790 env[1220]: time="2024-12-13T02:11:55.967757178Z" level=info msg="StopPodSandbox for \"87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729\" returns successfully" Dec 13 02:11:55.968772 env[1220]: time="2024-12-13T02:11:55.968731288Z" level=info msg="RemovePodSandbox for \"87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729\"" Dec 13 02:11:55.969032 env[1220]: time="2024-12-13T02:11:55.968928320Z" level=info msg="Forcibly stopping sandbox \"87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729\"" Dec 13 02:11:56.112062 env[1220]: time="2024-12-13T02:11:56.111923211Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-676dc55965-z9kjf,Uid:2d4619e8-f4c5-4739-8e31-b8a893278eb0,Namespace:calico-system,Attempt:0,}" Dec 13 02:11:56.227710 env[1220]: 2024-12-13 02:11:56.121 [WARNING][5099] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--665858c48b--kkf7t-eth0" Dec 13 02:11:56.227710 env[1220]: 2024-12-13 02:11:56.122 [INFO][5099] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" Dec 13 02:11:56.227710 env[1220]: 2024-12-13 02:11:56.122 [INFO][5099] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" iface="eth0" netns="" Dec 13 02:11:56.227710 env[1220]: 2024-12-13 02:11:56.122 [INFO][5099] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" Dec 13 02:11:56.227710 env[1220]: 2024-12-13 02:11:56.122 [INFO][5099] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" Dec 13 02:11:56.227710 env[1220]: 2024-12-13 02:11:56.198 [INFO][5120] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" HandleID="k8s-pod-network.87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--665858c48b--kkf7t-eth0" Dec 13 02:11:56.227710 env[1220]: 2024-12-13 02:11:56.201 [INFO][5120] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:11:56.227710 env[1220]: 2024-12-13 02:11:56.203 [INFO][5120] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:11:56.227710 env[1220]: 2024-12-13 02:11:56.214 [WARNING][5120] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" HandleID="k8s-pod-network.87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--665858c48b--kkf7t-eth0" Dec 13 02:11:56.227710 env[1220]: 2024-12-13 02:11:56.214 [INFO][5120] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" HandleID="k8s-pod-network.87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--665858c48b--kkf7t-eth0" Dec 13 02:11:56.227710 env[1220]: 2024-12-13 02:11:56.222 [INFO][5120] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:11:56.227710 env[1220]: 2024-12-13 02:11:56.225 [INFO][5099] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729" Dec 13 02:11:56.228685 env[1220]: time="2024-12-13T02:11:56.228625600Z" level=info msg="TearDown network for sandbox \"87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729\" successfully" Dec 13 02:11:56.241316 env[1220]: time="2024-12-13T02:11:56.241212678Z" level=info msg="RemovePodSandbox \"87bf311fc2594dee40cacb7d1c5a03439d61cb984e936f581976da132de4e729\" returns successfully" Dec 13 02:11:56.242079 env[1220]: time="2024-12-13T02:11:56.242035543Z" level=info msg="StopPodSandbox for \"c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae\"" Dec 13 02:11:56.503462 env[1220]: 2024-12-13 02:11:56.433 [WARNING][5161] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--665858c48b--kkf7t-eth0" Dec 13 02:11:56.503462 env[1220]: 2024-12-13 02:11:56.433 [INFO][5161] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" Dec 13 02:11:56.503462 env[1220]: 2024-12-13 02:11:56.433 [INFO][5161] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" iface="eth0" netns="" Dec 13 02:11:56.503462 env[1220]: 2024-12-13 02:11:56.434 [INFO][5161] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" Dec 13 02:11:56.503462 env[1220]: 2024-12-13 02:11:56.434 [INFO][5161] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" Dec 13 02:11:56.503462 env[1220]: 2024-12-13 02:11:56.482 [INFO][5178] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" HandleID="k8s-pod-network.c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--665858c48b--kkf7t-eth0" Dec 13 02:11:56.503462 env[1220]: 2024-12-13 02:11:56.482 [INFO][5178] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:11:56.503462 env[1220]: 2024-12-13 02:11:56.482 [INFO][5178] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:11:56.503462 env[1220]: 2024-12-13 02:11:56.498 [WARNING][5178] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" HandleID="k8s-pod-network.c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--665858c48b--kkf7t-eth0" Dec 13 02:11:56.503462 env[1220]: 2024-12-13 02:11:56.498 [INFO][5178] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" HandleID="k8s-pod-network.c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--665858c48b--kkf7t-eth0" Dec 13 02:11:56.503462 env[1220]: 2024-12-13 02:11:56.500 [INFO][5178] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:11:56.503462 env[1220]: 2024-12-13 02:11:56.502 [INFO][5161] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" Dec 13 02:11:56.504684 env[1220]: time="2024-12-13T02:11:56.503502301Z" level=info msg="TearDown network for sandbox \"c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae\" successfully" Dec 13 02:11:56.504684 env[1220]: time="2024-12-13T02:11:56.503546656Z" level=info msg="StopPodSandbox for \"c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae\" returns successfully" Dec 13 02:11:56.504684 env[1220]: time="2024-12-13T02:11:56.504294849Z" level=info msg="RemovePodSandbox for \"c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae\"" Dec 13 02:11:56.504684 env[1220]: time="2024-12-13T02:11:56.504341720Z" level=info msg="Forcibly stopping sandbox \"c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae\"" Dec 13 02:11:56.602730 systemd-networkd[1019]: cali985cad4e159: Link UP Dec 13 02:11:56.616664 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:11:56.616829 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali985cad4e159: link becomes ready Dec 13 02:11:56.621816 systemd-networkd[1019]: cali985cad4e159: Gained carrier Dec 13 02:11:56.646196 kubelet[2032]: I1213 02:11:56.645228 2032 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-rzlbz" podStartSLOduration=5.645199341 podStartE2EDuration="5.645199341s" podCreationTimestamp="2024-12-13 02:11:51 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:11:56.046420272 +0000 UTC m=+62.644890680" watchObservedRunningTime="2024-12-13 02:11:56.645199341 +0000 UTC m=+63.243669749" Dec 13 02:11:56.648831 env[1220]: 2024-12-13 02:11:56.278 [INFO][5124] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--676dc55965--z9kjf-eth0 calico-kube-controllers-676dc55965- calico-system 2d4619e8-f4c5-4739-8e31-b8a893278eb0 1099 0 2024-12-13 02:11:52 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:676dc55965 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal calico-kube-controllers-676dc55965-z9kjf eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali985cad4e159 [] []}} ContainerID="14bd1fe9ff774d10ab3148d31d9496a52f7c74af0ad2bcca5a244e5485e1871c" Namespace="calico-system" Pod="calico-kube-controllers-676dc55965-z9kjf" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--676dc55965--z9kjf-" Dec 13 02:11:56.648831 env[1220]: 2024-12-13 02:11:56.279 [INFO][5124] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="14bd1fe9ff774d10ab3148d31d9496a52f7c74af0ad2bcca5a244e5485e1871c" Namespace="calico-system" Pod="calico-kube-controllers-676dc55965-z9kjf" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--676dc55965--z9kjf-eth0" Dec 13 02:11:56.648831 env[1220]: 2024-12-13 02:11:56.422 [INFO][5162] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="14bd1fe9ff774d10ab3148d31d9496a52f7c74af0ad2bcca5a244e5485e1871c" HandleID="k8s-pod-network.14bd1fe9ff774d10ab3148d31d9496a52f7c74af0ad2bcca5a244e5485e1871c" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--676dc55965--z9kjf-eth0" Dec 13 02:11:56.648831 env[1220]: 2024-12-13 02:11:56.537 [INFO][5162] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="14bd1fe9ff774d10ab3148d31d9496a52f7c74af0ad2bcca5a244e5485e1871c" HandleID="k8s-pod-network.14bd1fe9ff774d10ab3148d31d9496a52f7c74af0ad2bcca5a244e5485e1871c" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--676dc55965--z9kjf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000fd9d0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal", "pod":"calico-kube-controllers-676dc55965-z9kjf", "timestamp":"2024-12-13 02:11:56.422170481 +0000 UTC"}, Hostname:"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:11:56.648831 env[1220]: 2024-12-13 02:11:56.537 [INFO][5162] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:11:56.648831 env[1220]: 2024-12-13 02:11:56.538 [INFO][5162] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:11:56.648831 env[1220]: 2024-12-13 02:11:56.538 [INFO][5162] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal' Dec 13 02:11:56.648831 env[1220]: 2024-12-13 02:11:56.541 [INFO][5162] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.14bd1fe9ff774d10ab3148d31d9496a52f7c74af0ad2bcca5a244e5485e1871c" host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:56.648831 env[1220]: 2024-12-13 02:11:56.546 [INFO][5162] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:56.648831 env[1220]: 2024-12-13 02:11:56.553 [INFO][5162] ipam/ipam.go 489: Trying affinity for 192.168.99.0/26 host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:56.648831 env[1220]: 2024-12-13 02:11:56.555 [INFO][5162] ipam/ipam.go 155: Attempting to load block cidr=192.168.99.0/26 host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:56.648831 env[1220]: 2024-12-13 02:11:56.559 [INFO][5162] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.99.0/26 host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:56.648831 env[1220]: 2024-12-13 02:11:56.560 [INFO][5162] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.99.0/26 handle="k8s-pod-network.14bd1fe9ff774d10ab3148d31d9496a52f7c74af0ad2bcca5a244e5485e1871c" host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:56.648831 env[1220]: 2024-12-13 02:11:56.564 [INFO][5162] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.14bd1fe9ff774d10ab3148d31d9496a52f7c74af0ad2bcca5a244e5485e1871c Dec 13 02:11:56.648831 env[1220]: 2024-12-13 02:11:56.573 [INFO][5162] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.99.0/26 handle="k8s-pod-network.14bd1fe9ff774d10ab3148d31d9496a52f7c74af0ad2bcca5a244e5485e1871c" host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:56.648831 env[1220]: 2024-12-13 02:11:56.587 [INFO][5162] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.99.7/26] block=192.168.99.0/26 handle="k8s-pod-network.14bd1fe9ff774d10ab3148d31d9496a52f7c74af0ad2bcca5a244e5485e1871c" host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:56.648831 env[1220]: 2024-12-13 02:11:56.587 [INFO][5162] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.99.7/26] handle="k8s-pod-network.14bd1fe9ff774d10ab3148d31d9496a52f7c74af0ad2bcca5a244e5485e1871c" host="ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal" Dec 13 02:11:56.648831 env[1220]: 2024-12-13 02:11:56.587 [INFO][5162] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:11:56.648831 env[1220]: 2024-12-13 02:11:56.587 [INFO][5162] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.99.7/26] IPv6=[] ContainerID="14bd1fe9ff774d10ab3148d31d9496a52f7c74af0ad2bcca5a244e5485e1871c" HandleID="k8s-pod-network.14bd1fe9ff774d10ab3148d31d9496a52f7c74af0ad2bcca5a244e5485e1871c" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--676dc55965--z9kjf-eth0" Dec 13 02:11:56.650066 env[1220]: 2024-12-13 02:11:56.590 [INFO][5124] cni-plugin/k8s.go 386: Populated endpoint ContainerID="14bd1fe9ff774d10ab3148d31d9496a52f7c74af0ad2bcca5a244e5485e1871c" Namespace="calico-system" Pod="calico-kube-controllers-676dc55965-z9kjf" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--676dc55965--z9kjf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--676dc55965--z9kjf-eth0", GenerateName:"calico-kube-controllers-676dc55965-", Namespace:"calico-system", SelfLink:"", UID:"2d4619e8-f4c5-4739-8e31-b8a893278eb0", ResourceVersion:"1099", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 11, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"676dc55965", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-kube-controllers-676dc55965-z9kjf", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.99.7/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali985cad4e159", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:11:56.650066 env[1220]: 2024-12-13 02:11:56.590 [INFO][5124] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.99.7/32] ContainerID="14bd1fe9ff774d10ab3148d31d9496a52f7c74af0ad2bcca5a244e5485e1871c" Namespace="calico-system" Pod="calico-kube-controllers-676dc55965-z9kjf" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--676dc55965--z9kjf-eth0" Dec 13 02:11:56.650066 env[1220]: 2024-12-13 02:11:56.590 [INFO][5124] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali985cad4e159 ContainerID="14bd1fe9ff774d10ab3148d31d9496a52f7c74af0ad2bcca5a244e5485e1871c" Namespace="calico-system" Pod="calico-kube-controllers-676dc55965-z9kjf" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--676dc55965--z9kjf-eth0" Dec 13 02:11:56.650066 env[1220]: 2024-12-13 02:11:56.623 [INFO][5124] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="14bd1fe9ff774d10ab3148d31d9496a52f7c74af0ad2bcca5a244e5485e1871c" Namespace="calico-system" Pod="calico-kube-controllers-676dc55965-z9kjf" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--676dc55965--z9kjf-eth0" Dec 13 02:11:56.650066 env[1220]: 2024-12-13 02:11:56.623 [INFO][5124] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="14bd1fe9ff774d10ab3148d31d9496a52f7c74af0ad2bcca5a244e5485e1871c" Namespace="calico-system" Pod="calico-kube-controllers-676dc55965-z9kjf" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--676dc55965--z9kjf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--676dc55965--z9kjf-eth0", GenerateName:"calico-kube-controllers-676dc55965-", Namespace:"calico-system", SelfLink:"", UID:"2d4619e8-f4c5-4739-8e31-b8a893278eb0", ResourceVersion:"1099", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 11, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"676dc55965", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-d705eaa12197eac35354.c.flatcar-212911.internal", ContainerID:"14bd1fe9ff774d10ab3148d31d9496a52f7c74af0ad2bcca5a244e5485e1871c", Pod:"calico-kube-controllers-676dc55965-z9kjf", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.99.7/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali985cad4e159", MAC:"ba:ed:36:52:e7:d0", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:11:56.650066 env[1220]: 2024-12-13 02:11:56.646 [INFO][5124] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="14bd1fe9ff774d10ab3148d31d9496a52f7c74af0ad2bcca5a244e5485e1871c" Namespace="calico-system" Pod="calico-kube-controllers-676dc55965-z9kjf" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--676dc55965--z9kjf-eth0" Dec 13 02:11:56.720997 env[1220]: time="2024-12-13T02:11:56.720676894Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:11:56.721494 env[1220]: time="2024-12-13T02:11:56.721245167Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:11:56.721494 env[1220]: time="2024-12-13T02:11:56.721288352Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:11:56.722068 env[1220]: time="2024-12-13T02:11:56.721997795Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/14bd1fe9ff774d10ab3148d31d9496a52f7c74af0ad2bcca5a244e5485e1871c pid=5232 runtime=io.containerd.runc.v2 Dec 13 02:11:56.725487 env[1220]: 2024-12-13 02:11:56.631 [WARNING][5198] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" WorkloadEndpoint="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--665858c48b--kkf7t-eth0" Dec 13 02:11:56.725487 env[1220]: 2024-12-13 02:11:56.632 [INFO][5198] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" Dec 13 02:11:56.725487 env[1220]: 2024-12-13 02:11:56.632 [INFO][5198] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" iface="eth0" netns="" Dec 13 02:11:56.725487 env[1220]: 2024-12-13 02:11:56.632 [INFO][5198] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" Dec 13 02:11:56.725487 env[1220]: 2024-12-13 02:11:56.632 [INFO][5198] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" Dec 13 02:11:56.725487 env[1220]: 2024-12-13 02:11:56.703 [INFO][5209] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" HandleID="k8s-pod-network.c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--665858c48b--kkf7t-eth0" Dec 13 02:11:56.725487 env[1220]: 2024-12-13 02:11:56.703 [INFO][5209] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:11:56.725487 env[1220]: 2024-12-13 02:11:56.703 [INFO][5209] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:11:56.725487 env[1220]: 2024-12-13 02:11:56.715 [WARNING][5209] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" HandleID="k8s-pod-network.c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--665858c48b--kkf7t-eth0" Dec 13 02:11:56.725487 env[1220]: 2024-12-13 02:11:56.715 [INFO][5209] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" HandleID="k8s-pod-network.c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" Workload="ci--3510--3--6--d705eaa12197eac35354.c.flatcar--212911.internal-k8s-calico--kube--controllers--665858c48b--kkf7t-eth0" Dec 13 02:11:56.725487 env[1220]: 2024-12-13 02:11:56.719 [INFO][5209] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:11:56.725487 env[1220]: 2024-12-13 02:11:56.722 [INFO][5198] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae" Dec 13 02:11:56.726372 env[1220]: time="2024-12-13T02:11:56.726324044Z" level=info msg="TearDown network for sandbox \"c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae\" successfully" Dec 13 02:11:56.731697 env[1220]: time="2024-12-13T02:11:56.731607944Z" level=info msg="RemovePodSandbox \"c34f6891ceff48dcbad6576a3fb330faedccddd86c7e4de3fe1c53b790dd43ae\" returns successfully" Dec 13 02:11:56.769313 systemd[1]: Started cri-containerd-14bd1fe9ff774d10ab3148d31d9496a52f7c74af0ad2bcca5a244e5485e1871c.scope. Dec 13 02:11:56.823647 kernel: kauditd_printk_skb: 233 callbacks suppressed Dec 13 02:11:56.823829 kernel: audit: type=1400 audit(1734055916.799:1316): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.851966 kernel: audit: type=1400 audit(1734055916.799:1317): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.852152 kernel: audit: type=1400 audit(1734055916.799:1318): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.896697 kernel: audit: type=1400 audit(1734055916.799:1319): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.921591 kernel: audit: type=1400 audit(1734055916.799:1320): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.943742 kernel: audit: type=1400 audit(1734055916.799:1321): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.966736 kernel: audit: type=1400 audit(1734055916.799:1322): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.992536 kernel: audit: type=1400 audit(1734055916.799:1323): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.992757 kernel: audit: type=1400 audit(1734055916.799:1324): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:57.035983 kernel: audit: type=1400 audit(1734055916.800:1325): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.800000 audit: BPF prog-id=230 op=LOAD Dec 13 02:11:56.820000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.820000 audit[5243]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=5232 pid=5243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:56.820000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134626431666539666637373464313061623331343864333164393439 Dec 13 02:11:56.820000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.820000 audit[5243]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=5232 pid=5243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:56.820000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134626431666539666637373464313061623331343864333164393439 Dec 13 02:11:56.820000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.820000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.820000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.820000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.820000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.820000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.820000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.820000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.820000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.820000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.820000 audit: BPF prog-id=231 op=LOAD Dec 13 02:11:56.820000 audit[5243]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0000253a0 items=0 ppid=5232 pid=5243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:56.820000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134626431666539666637373464313061623331343864333164393439 Dec 13 02:11:56.827000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.827000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.827000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.827000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.827000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.827000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.827000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.827000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.827000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.827000 audit: BPF prog-id=232 op=LOAD Dec 13 02:11:56.827000 audit[5243]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000253e8 items=0 ppid=5232 pid=5243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:56.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134626431666539666637373464313061623331343864333164393439 Dec 13 02:11:56.827000 audit: BPF prog-id=232 op=UNLOAD Dec 13 02:11:56.827000 audit: BPF prog-id=231 op=UNLOAD Dec 13 02:11:56.827000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.827000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.827000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.827000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.827000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.827000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.827000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.827000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.827000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.827000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:56.827000 audit: BPF prog-id=233 op=LOAD Dec 13 02:11:56.827000 audit[5243]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000257f8 items=0 ppid=5232 pid=5243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:56.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134626431666539666637373464313061623331343864333164393439 Dec 13 02:11:57.062987 env[1220]: time="2024-12-13T02:11:57.062917318Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-676dc55965-z9kjf,Uid:2d4619e8-f4c5-4739-8e31-b8a893278eb0,Namespace:calico-system,Attempt:0,} returns sandbox id \"14bd1fe9ff774d10ab3148d31d9496a52f7c74af0ad2bcca5a244e5485e1871c\"" Dec 13 02:11:57.071312 systemd[1]: run-containerd-runc-k8s.io-03a167270979fe02c4e4978919996a1c898f440300afbc066b151c30d9b934ff-runc.bWOdLa.mount: Deactivated successfully. Dec 13 02:11:57.141918 env[1220]: time="2024-12-13T02:11:57.141864829Z" level=info msg="CreateContainer within sandbox \"14bd1fe9ff774d10ab3148d31d9496a52f7c74af0ad2bcca5a244e5485e1871c\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 02:11:57.162086 env[1220]: time="2024-12-13T02:11:57.162007217Z" level=info msg="CreateContainer within sandbox \"14bd1fe9ff774d10ab3148d31d9496a52f7c74af0ad2bcca5a244e5485e1871c\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"a8cf7a2276a9feca6bba0404a5b324e2a751a16938fc9813f911ee998c45478d\"" Dec 13 02:11:57.163739 env[1220]: time="2024-12-13T02:11:57.163690835Z" level=info msg="StartContainer for \"a8cf7a2276a9feca6bba0404a5b324e2a751a16938fc9813f911ee998c45478d\"" Dec 13 02:11:57.194415 systemd[1]: Started cri-containerd-a8cf7a2276a9feca6bba0404a5b324e2a751a16938fc9813f911ee998c45478d.scope. Dec 13 02:11:57.204000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:11:57.204000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0010ac000 a2=fc6 a3=0 items=0 ppid=1751 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 key=(null) Dec 13 02:11:57.204000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:11:57.204000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:11:57.204000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001077780 a2=fc6 a3=0 items=0 ppid=1751 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 key=(null) Dec 13 02:11:57.204000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:11:57.204000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:11:57.204000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001077800 a2=fc6 a3=0 items=0 ppid=1751 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 key=(null) Dec 13 02:11:57.204000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:11:57.205000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:11:57.205000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001077bc0 a2=fc6 a3=0 items=0 ppid=1751 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 key=(null) Dec 13 02:11:57.205000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:11:57.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:57.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:57.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:57.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:57.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:57.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:57.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:57.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:57.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:57.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:57.269000 audit: BPF prog-id=234 op=LOAD Dec 13 02:11:57.270000 audit[5295]: AVC avc: denied { bpf } for pid=5295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:57.270000 audit[5295]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=5232 pid=5295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:57.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138636637613232373661396665636136626261303430346135623332 Dec 13 02:11:57.271000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:57.271000 audit[5295]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=5232 pid=5295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:57.271000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138636637613232373661396665636136626261303430346135623332 Dec 13 02:11:57.271000 audit[5295]: AVC avc: denied { bpf } for pid=5295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:57.271000 audit[5295]: AVC avc: denied { bpf } for pid=5295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:57.271000 audit[5295]: AVC avc: denied { bpf } for pid=5295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:57.271000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:57.271000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:57.271000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:57.271000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:57.271000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:57.271000 audit[5295]: AVC avc: denied { bpf } for pid=5295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:57.271000 audit[5295]: AVC avc: denied { bpf } for pid=5295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:57.271000 audit: BPF prog-id=235 op=LOAD Dec 13 02:11:57.271000 audit[5295]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000257d00 items=0 ppid=5232 pid=5295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:57.271000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138636637613232373661396665636136626261303430346135623332 Dec 13 02:11:57.273000 audit[5295]: AVC avc: denied { bpf } for pid=5295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:57.273000 audit[5295]: AVC avc: denied { bpf } for pid=5295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:57.273000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:57.273000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:57.273000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:57.273000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:57.273000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:57.273000 audit[5295]: AVC avc: denied { bpf } for pid=5295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:57.273000 audit[5295]: AVC avc: denied { bpf } for pid=5295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:57.273000 audit: BPF prog-id=236 op=LOAD Dec 13 02:11:57.273000 audit[5295]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000257d48 items=0 ppid=5232 pid=5295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:57.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138636637613232373661396665636136626261303430346135623332 Dec 13 02:11:57.274000 audit: BPF prog-id=236 op=UNLOAD Dec 13 02:11:57.274000 audit: BPF prog-id=235 op=UNLOAD Dec 13 02:11:57.274000 audit[5295]: AVC avc: denied { bpf } for pid=5295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:57.274000 audit[5295]: AVC avc: denied { bpf } for pid=5295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:57.274000 audit[5295]: AVC avc: denied { bpf } for pid=5295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:57.274000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:57.274000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:57.274000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:57.274000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:57.274000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:57.274000 audit[5295]: AVC avc: denied { bpf } for pid=5295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:57.274000 audit[5295]: AVC avc: denied { bpf } for pid=5295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:11:57.274000 audit: BPF prog-id=237 op=LOAD Dec 13 02:11:57.274000 audit[5295]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003be158 items=0 ppid=5232 pid=5295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:57.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138636637613232373661396665636136626261303430346135623332 Dec 13 02:11:57.344912 env[1220]: time="2024-12-13T02:11:57.344775049Z" level=info msg="StartContainer for \"a8cf7a2276a9feca6bba0404a5b324e2a751a16938fc9813f911ee998c45478d\" returns successfully" Dec 13 02:11:57.378015 systemd[1]: Started sshd@9-10.128.0.74:22-139.178.68.195:57132.service. Dec 13 02:11:57.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.74:22-139.178.68.195:57132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:11:57.533000 audit[5355]: AVC avc: denied { write } for pid=5355 comm="tee" name="fd" dev="proc" ino=31104 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:11:57.536000 audit[5358]: AVC avc: denied { write } for pid=5358 comm="tee" name="fd" dev="proc" ino=31105 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:11:57.533000 audit[5355]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcac50e9c4 a2=241 a3=1b6 items=1 ppid=5344 pid=5355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:57.536000 audit[5358]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffccb4d9b4 a2=241 a3=1b6 items=1 ppid=5336 pid=5358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:57.533000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 02:11:57.536000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 02:11:57.533000 audit: PATH item=0 name="/dev/fd/63" inode=31069 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:11:57.536000 audit: PATH item=0 name="/dev/fd/63" inode=31070 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:11:57.533000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:11:57.536000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:11:57.592000 audit[5383]: AVC avc: denied { write } for pid=5383 comm="tee" name="fd" dev="proc" ino=31125 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:11:57.592000 audit[5383]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcf10269c5 a2=241 a3=1b6 items=1 ppid=5342 pid=5383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:57.592000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 02:11:57.592000 audit: PATH item=0 name="/dev/fd/63" inode=31110 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:11:57.592000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:11:57.605000 audit[5389]: AVC avc: denied { write } for pid=5389 comm="tee" name="fd" dev="proc" ino=31129 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:11:57.605000 audit[5389]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffbb3fb9c4 a2=241 a3=1b6 items=1 ppid=5352 pid=5389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:57.605000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 02:11:57.605000 audit: PATH item=0 name="/dev/fd/63" inode=31944 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:11:57.605000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:11:57.642000 audit[5403]: AVC avc: denied { write } for pid=5403 comm="tee" name="fd" dev="proc" ino=31957 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:11:57.646000 audit[5401]: AVC avc: denied { write } for pid=5401 comm="tee" name="fd" dev="proc" ino=31960 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:11:57.646000 audit[5401]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe1abce9c4 a2=241 a3=1b6 items=1 ppid=5347 pid=5401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:57.646000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 02:11:57.646000 audit: PATH item=0 name="/dev/fd/63" inode=31119 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:11:57.646000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:11:57.642000 audit[5403]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc0800e9c6 a2=241 a3=1b6 items=1 ppid=5337 pid=5403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:57.642000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 02:11:57.642000 audit: PATH item=0 name="/dev/fd/63" inode=31122 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:11:57.642000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:11:57.679000 audit[5414]: AVC avc: denied { write } for pid=5414 comm="tee" name="fd" dev="proc" ino=31137 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:11:57.688000 audit[5326]: USER_ACCT pid=5326 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:11:57.690963 sshd[5326]: Accepted publickey for core from 139.178.68.195 port 57132 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:11:57.690000 audit[5326]: CRED_ACQ pid=5326 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:11:57.690000 audit[5326]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed0b5cf20 a2=3 a3=0 items=0 ppid=1 pid=5326 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:57.690000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:11:57.692146 sshd[5326]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:11:57.679000 audit[5414]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe397b29b5 a2=241 a3=1b6 items=1 ppid=5360 pid=5414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:11:57.679000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 02:11:57.679000 audit: PATH item=0 name="/dev/fd/63" inode=31134 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:11:57.679000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:11:57.701642 systemd[1]: Started session-9.scope. Dec 13 02:11:57.702510 systemd-logind[1211]: New session 9 of user core. Dec 13 02:11:57.712000 audit[5326]: USER_START pid=5326 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:11:57.715000 audit[5416]: CRED_ACQ pid=5416 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:11:57.854483 systemd-networkd[1019]: cali985cad4e159: Gained IPv6LL Dec 13 02:11:58.041838 sshd[5326]: pam_unix(sshd:session): session closed for user core Dec 13 02:11:58.043000 audit[5326]: USER_END pid=5326 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:11:58.043000 audit[5326]: CRED_DISP pid=5326 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:11:58.059138 systemd[1]: sshd@9-10.128.0.74:22-139.178.68.195:57132.service: Deactivated successfully. Dec 13 02:11:58.063000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.74:22-139.178.68.195:57132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:11:58.083339 systemd[1]: run-containerd-runc-k8s.io-a8cf7a2276a9feca6bba0404a5b324e2a751a16938fc9813f911ee998c45478d-runc.SMCGYS.mount: Deactivated successfully. Dec 13 02:11:58.088408 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 02:11:58.090398 systemd-logind[1211]: Session 9 logged out. Waiting for processes to exit. Dec 13 02:11:58.092273 systemd-logind[1211]: Removed session 9. Dec 13 02:11:59.076124 systemd[1]: run-containerd-runc-k8s.io-a8cf7a2276a9feca6bba0404a5b324e2a751a16938fc9813f911ee998c45478d-runc.BmvTfI.mount: Deactivated successfully. Dec 13 02:12:03.087691 systemd[1]: Started sshd@10-10.128.0.74:22-139.178.68.195:57134.service. Dec 13 02:12:03.118410 kernel: kauditd_printk_skb: 162 callbacks suppressed Dec 13 02:12:03.118636 kernel: audit: type=1130 audit(1734055923.086:1372): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.74:22-139.178.68.195:57134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:12:03.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.74:22-139.178.68.195:57134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:12:03.383000 audit[5574]: USER_ACCT pid=5574 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:03.415268 sshd[5574]: Accepted publickey for core from 139.178.68.195 port 57134 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:12:03.415744 kernel: audit: type=1101 audit(1734055923.383:1373): pid=5574 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:03.417252 sshd[5574]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:12:03.414000 audit[5574]: CRED_ACQ pid=5574 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:03.444681 kernel: audit: type=1103 audit(1734055923.414:1374): pid=5574 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:03.462601 kernel: audit: type=1006 audit(1734055923.415:1375): pid=5574 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Dec 13 02:12:03.415000 audit[5574]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe947d520 a2=3 a3=0 items=0 ppid=1 pid=5574 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:03.469150 systemd[1]: Started session-10.scope. Dec 13 02:12:03.478709 systemd-logind[1211]: New session 10 of user core. Dec 13 02:12:03.492866 kernel: audit: type=1300 audit(1734055923.415:1375): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe947d520 a2=3 a3=0 items=0 ppid=1 pid=5574 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:03.493002 kernel: audit: type=1327 audit(1734055923.415:1375): proctitle=737368643A20636F7265205B707269765D Dec 13 02:12:03.415000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:12:03.490000 audit[5574]: USER_START pid=5574 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:03.536683 kernel: audit: type=1105 audit(1734055923.490:1376): pid=5574 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:03.535000 audit[5594]: CRED_ACQ pid=5594 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:03.562598 kernel: audit: type=1103 audit(1734055923.535:1377): pid=5594 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:03.800980 sshd[5574]: pam_unix(sshd:session): session closed for user core Dec 13 02:12:03.801000 audit[5574]: USER_END pid=5574 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:03.806585 systemd-logind[1211]: Session 10 logged out. Waiting for processes to exit. Dec 13 02:12:03.809012 systemd[1]: sshd@10-10.128.0.74:22-139.178.68.195:57134.service: Deactivated successfully. Dec 13 02:12:03.810367 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 02:12:03.812919 systemd-logind[1211]: Removed session 10. Dec 13 02:12:03.802000 audit[5574]: CRED_DISP pid=5574 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:03.860602 kernel: audit: type=1106 audit(1734055923.801:1378): pid=5574 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:03.860796 kernel: audit: type=1104 audit(1734055923.802:1379): pid=5574 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:03.807000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.74:22-139.178.68.195:57134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:12:08.879591 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 02:12:08.879805 kernel: audit: type=1130 audit(1734055928.848:1381): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.74:22-139.178.68.195:59654 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:12:08.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.74:22-139.178.68.195:59654 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:12:08.849116 systemd[1]: Started sshd@11-10.128.0.74:22-139.178.68.195:59654.service. Dec 13 02:12:09.150000 audit[5697]: USER_ACCT pid=5697 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:09.153364 sshd[5697]: Accepted publickey for core from 139.178.68.195 port 59654 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:12:09.181794 kernel: audit: type=1101 audit(1734055929.150:1382): pid=5697 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:09.181000 audit[5697]: CRED_ACQ pid=5697 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:09.183682 sshd[5697]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:12:09.192513 systemd[1]: Started session-11.scope. Dec 13 02:12:09.194220 systemd-logind[1211]: New session 11 of user core. Dec 13 02:12:09.210304 kernel: audit: type=1103 audit(1734055929.181:1383): pid=5697 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:09.210442 kernel: audit: type=1006 audit(1734055929.182:1384): pid=5697 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Dec 13 02:12:09.227761 kernel: audit: type=1300 audit(1734055929.182:1384): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf54289a0 a2=3 a3=0 items=0 ppid=1 pid=5697 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:09.182000 audit[5697]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf54289a0 a2=3 a3=0 items=0 ppid=1 pid=5697 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:09.182000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:12:09.253713 kernel: audit: type=1327 audit(1734055929.182:1384): proctitle=737368643A20636F7265205B707269765D Dec 13 02:12:09.206000 audit[5697]: USER_START pid=5697 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:09.263683 kernel: audit: type=1105 audit(1734055929.206:1385): pid=5697 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:09.207000 audit[5713]: CRED_ACQ pid=5713 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:09.321078 kernel: audit: type=1103 audit(1734055929.207:1386): pid=5713 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:09.481182 sshd[5697]: pam_unix(sshd:session): session closed for user core Dec 13 02:12:09.483000 audit[5697]: USER_END pid=5697 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:09.486757 systemd[1]: sshd@11-10.128.0.74:22-139.178.68.195:59654.service: Deactivated successfully. Dec 13 02:12:09.488018 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 02:12:09.490869 systemd-logind[1211]: Session 11 logged out. Waiting for processes to exit. Dec 13 02:12:09.492496 systemd-logind[1211]: Removed session 11. Dec 13 02:12:09.518617 kernel: audit: type=1106 audit(1734055929.483:1387): pid=5697 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:09.518800 kernel: audit: type=1104 audit(1734055929.483:1388): pid=5697 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:09.483000 audit[5697]: CRED_DISP pid=5697 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:09.486000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.74:22-139.178.68.195:59654 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:12:09.549235 systemd[1]: Started sshd@12-10.128.0.74:22-139.178.68.195:59664.service. Dec 13 02:12:09.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.74:22-139.178.68.195:59664 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:12:09.843000 audit[5724]: USER_ACCT pid=5724 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:09.844184 sshd[5724]: Accepted publickey for core from 139.178.68.195 port 59664 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:12:09.845000 audit[5724]: CRED_ACQ pid=5724 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:09.845000 audit[5724]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff50dfe300 a2=3 a3=0 items=0 ppid=1 pid=5724 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:09.845000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:12:09.846393 sshd[5724]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:12:09.853697 systemd-logind[1211]: New session 12 of user core. Dec 13 02:12:09.853972 systemd[1]: Started session-12.scope. Dec 13 02:12:09.862000 audit[5724]: USER_START pid=5724 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:09.865000 audit[5734]: CRED_ACQ pid=5734 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:10.271004 sshd[5724]: pam_unix(sshd:session): session closed for user core Dec 13 02:12:10.272000 audit[5724]: USER_END pid=5724 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:10.272000 audit[5724]: CRED_DISP pid=5724 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:10.277188 systemd-logind[1211]: Session 12 logged out. Waiting for processes to exit. Dec 13 02:12:10.280000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.74:22-139.178.68.195:59664 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:12:10.280432 systemd[1]: sshd@12-10.128.0.74:22-139.178.68.195:59664.service: Deactivated successfully. Dec 13 02:12:10.281747 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 02:12:10.285551 systemd-logind[1211]: Removed session 12. Dec 13 02:12:10.317149 systemd[1]: Started sshd@13-10.128.0.74:22-139.178.68.195:59666.service. Dec 13 02:12:10.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.74:22-139.178.68.195:59666 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:12:10.612000 audit[5754]: USER_ACCT pid=5754 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:10.614265 sshd[5754]: Accepted publickey for core from 139.178.68.195 port 59666 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:12:10.614000 audit[5754]: CRED_ACQ pid=5754 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:10.614000 audit[5754]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffedac711b0 a2=3 a3=0 items=0 ppid=1 pid=5754 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:10.614000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:12:10.616198 sshd[5754]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:12:10.625663 systemd-logind[1211]: New session 13 of user core. Dec 13 02:12:10.625891 systemd[1]: Started session-13.scope. Dec 13 02:12:10.635000 audit[5754]: USER_START pid=5754 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:10.637000 audit[5758]: CRED_ACQ pid=5758 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:10.915028 sshd[5754]: pam_unix(sshd:session): session closed for user core Dec 13 02:12:10.916000 audit[5754]: USER_END pid=5754 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:10.917000 audit[5754]: CRED_DISP pid=5754 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:10.920325 systemd[1]: sshd@13-10.128.0.74:22-139.178.68.195:59666.service: Deactivated successfully. Dec 13 02:12:10.920000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.74:22-139.178.68.195:59666 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:12:10.921671 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 02:12:10.922756 systemd-logind[1211]: Session 13 logged out. Waiting for processes to exit. Dec 13 02:12:10.924469 systemd-logind[1211]: Removed session 13. Dec 13 02:12:13.581173 kubelet[2032]: I1213 02:12:13.581126 2032 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:12:13.605501 kubelet[2032]: I1213 02:12:13.605416 2032 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-676dc55965-z9kjf" podStartSLOduration=21.605392309 podStartE2EDuration="21.605392309s" podCreationTimestamp="2024-12-13 02:11:52 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:11:58.068101247 +0000 UTC m=+64.666571654" watchObservedRunningTime="2024-12-13 02:12:13.605392309 +0000 UTC m=+80.203862714" Dec 13 02:12:13.672000 audit[5830]: NETFILTER_CFG table=filter:127 family=2 entries=10 op=nft_register_rule pid=5830 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:12:13.672000 audit[5830]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffec8838a60 a2=0 a3=7ffec8838a4c items=0 ppid=2179 pid=5830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:13.672000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:12:13.677000 audit[5830]: NETFILTER_CFG table=nat:128 family=2 entries=32 op=nft_register_chain pid=5830 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:12:13.677000 audit[5830]: SYSCALL arch=c000003e syscall=46 success=yes exit=10468 a0=3 a1=7ffec8838a60 a2=0 a3=7ffec8838a4c items=0 ppid=2179 pid=5830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:13.677000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:12:15.963399 systemd[1]: Started sshd@14-10.128.0.74:22-139.178.68.195:59672.service. Dec 13 02:12:15.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.74:22-139.178.68.195:59672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:12:15.994129 kernel: kauditd_printk_skb: 29 callbacks suppressed Dec 13 02:12:15.994297 kernel: audit: type=1130 audit(1734055935.962:1410): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.74:22-139.178.68.195:59672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:12:16.268772 sshd[5877]: Accepted publickey for core from 139.178.68.195 port 59672 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:12:16.269781 sshd[5877]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:12:16.265000 audit[5877]: USER_ACCT pid=5877 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:16.301480 kernel: audit: type=1101 audit(1734055936.265:1411): pid=5877 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:16.267000 audit[5877]: CRED_ACQ pid=5877 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:16.307597 systemd[1]: Started session-14.scope. Dec 13 02:12:16.308678 systemd-logind[1211]: New session 14 of user core. Dec 13 02:12:16.344972 kernel: audit: type=1103 audit(1734055936.267:1412): pid=5877 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:16.345141 kernel: audit: type=1006 audit(1734055936.267:1413): pid=5877 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Dec 13 02:12:16.267000 audit[5877]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa86ca1b0 a2=3 a3=0 items=0 ppid=1 pid=5877 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:16.373477 kernel: audit: type=1300 audit(1734055936.267:1413): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa86ca1b0 a2=3 a3=0 items=0 ppid=1 pid=5877 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:16.267000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:12:16.383642 kernel: audit: type=1327 audit(1734055936.267:1413): proctitle=737368643A20636F7265205B707269765D Dec 13 02:12:16.383797 kernel: audit: type=1105 audit(1734055936.330:1414): pid=5877 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:16.330000 audit[5877]: USER_START pid=5877 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:16.342000 audit[5885]: CRED_ACQ pid=5885 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:16.440675 kernel: audit: type=1103 audit(1734055936.342:1415): pid=5885 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:16.669848 sshd[5877]: pam_unix(sshd:session): session closed for user core Dec 13 02:12:16.670000 audit[5877]: USER_END pid=5877 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:16.704619 kernel: audit: type=1106 audit(1734055936.670:1416): pid=5877 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:16.707887 systemd-logind[1211]: Session 14 logged out. Waiting for processes to exit. Dec 13 02:12:16.710303 systemd[1]: sshd@14-10.128.0.74:22-139.178.68.195:59672.service: Deactivated successfully. Dec 13 02:12:16.711518 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 02:12:16.715471 systemd-logind[1211]: Removed session 14. Dec 13 02:12:16.703000 audit[5877]: CRED_DISP pid=5877 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:16.747604 kernel: audit: type=1104 audit(1734055936.703:1417): pid=5877 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:16.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.74:22-139.178.68.195:59672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:12:21.721055 systemd[1]: Started sshd@15-10.128.0.74:22-139.178.68.195:46494.service. Dec 13 02:12:21.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.74:22-139.178.68.195:46494 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:12:21.727350 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 02:12:21.727483 kernel: audit: type=1130 audit(1734055941.721:1419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.74:22-139.178.68.195:46494 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:12:22.047000 audit[6005]: USER_ACCT pid=6005 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:22.085448 kernel: audit: type=1101 audit(1734055942.047:1420): pid=6005 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:22.081249 sshd[6005]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:12:22.087526 sshd[6005]: Accepted publickey for core from 139.178.68.195 port 46494 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:12:22.099813 systemd[1]: Started session-15.scope. Dec 13 02:12:22.079000 audit[6005]: CRED_ACQ pid=6005 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:22.103918 systemd-logind[1211]: New session 15 of user core. Dec 13 02:12:22.126905 kernel: audit: type=1103 audit(1734055942.079:1421): pid=6005 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:22.148042 systemd[1]: run-containerd-runc-k8s.io-03a167270979fe02c4e4978919996a1c898f440300afbc066b151c30d9b934ff-runc.LY1vXd.mount: Deactivated successfully. Dec 13 02:12:22.179704 kernel: audit: type=1006 audit(1734055942.080:1422): pid=6005 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Dec 13 02:12:22.080000 audit[6005]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec1cd2560 a2=3 a3=0 items=0 ppid=1 pid=6005 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:22.220744 kernel: audit: type=1300 audit(1734055942.080:1422): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec1cd2560 a2=3 a3=0 items=0 ppid=1 pid=6005 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:22.080000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:12:22.138000 audit[6005]: USER_START pid=6005 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:22.268621 kernel: audit: type=1327 audit(1734055942.080:1422): proctitle=737368643A20636F7265205B707269765D Dec 13 02:12:22.268808 kernel: audit: type=1105 audit(1734055942.138:1423): pid=6005 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:22.152000 audit[6017]: CRED_ACQ pid=6017 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:22.319699 kernel: audit: type=1103 audit(1734055942.152:1424): pid=6017 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:22.517829 sshd[6005]: pam_unix(sshd:session): session closed for user core Dec 13 02:12:22.518000 audit[6005]: USER_END pid=6005 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:22.552602 kernel: audit: type=1106 audit(1734055942.518:1425): pid=6005 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:22.536000 audit[6005]: CRED_DISP pid=6005 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:22.557123 systemd-logind[1211]: Session 15 logged out. Waiting for processes to exit. Dec 13 02:12:22.559513 systemd[1]: sshd@15-10.128.0.74:22-139.178.68.195:46494.service: Deactivated successfully. Dec 13 02:12:22.560725 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 02:12:22.564105 systemd-logind[1211]: Removed session 15. Dec 13 02:12:22.559000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.74:22-139.178.68.195:46494 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:12:22.578725 kernel: audit: type=1104 audit(1734055942.536:1426): pid=6005 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:26.142259 systemd[1]: run-containerd-runc-k8s.io-a8cf7a2276a9feca6bba0404a5b324e2a751a16938fc9813f911ee998c45478d-runc.YrqXl6.mount: Deactivated successfully. Dec 13 02:12:27.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.74:22-139.178.68.195:34846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:12:27.564869 systemd[1]: Started sshd@16-10.128.0.74:22-139.178.68.195:34846.service. Dec 13 02:12:27.574344 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 02:12:27.574529 kernel: audit: type=1130 audit(1734055947.564:1428): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.74:22-139.178.68.195:34846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:12:27.868000 audit[6167]: USER_ACCT pid=6167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:27.870898 sshd[6167]: Accepted publickey for core from 139.178.68.195 port 34846 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:12:27.900515 sshd[6167]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:12:27.901039 kernel: audit: type=1101 audit(1734055947.868:1429): pid=6167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:27.901109 kernel: audit: type=1103 audit(1734055947.878:1430): pid=6167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:27.878000 audit[6167]: CRED_ACQ pid=6167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:27.935961 systemd-logind[1211]: New session 16 of user core. Dec 13 02:12:27.939004 systemd[1]: Started session-16.scope. Dec 13 02:12:27.878000 audit[6167]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc849abd20 a2=3 a3=0 items=0 ppid=1 pid=6167 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:27.976341 kernel: audit: type=1006 audit(1734055947.878:1431): pid=6167 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Dec 13 02:12:27.976533 kernel: audit: type=1300 audit(1734055947.878:1431): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc849abd20 a2=3 a3=0 items=0 ppid=1 pid=6167 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:27.878000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:12:27.990636 kernel: audit: type=1327 audit(1734055947.878:1431): proctitle=737368643A20636F7265205B707269765D Dec 13 02:12:27.951000 audit[6167]: USER_START pid=6167 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:27.977000 audit[6177]: CRED_ACQ pid=6177 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:28.048553 kernel: audit: type=1105 audit(1734055947.951:1432): pid=6167 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:28.048765 kernel: audit: type=1103 audit(1734055947.977:1433): pid=6177 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:28.267406 sshd[6167]: pam_unix(sshd:session): session closed for user core Dec 13 02:12:28.267000 audit[6167]: USER_END pid=6167 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:28.267000 audit[6167]: CRED_DISP pid=6167 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:28.304151 systemd[1]: sshd@16-10.128.0.74:22-139.178.68.195:34846.service: Deactivated successfully. Dec 13 02:12:28.305403 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 02:12:28.307699 systemd-logind[1211]: Session 16 logged out. Waiting for processes to exit. Dec 13 02:12:28.309866 systemd-logind[1211]: Removed session 16. Dec 13 02:12:28.326358 kernel: audit: type=1106 audit(1734055948.267:1434): pid=6167 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:28.326581 kernel: audit: type=1104 audit(1734055948.267:1435): pid=6167 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:28.301000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.74:22-139.178.68.195:34846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:12:33.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.74:22-139.178.68.195:34862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:12:33.315801 systemd[1]: Started sshd@17-10.128.0.74:22-139.178.68.195:34862.service. Dec 13 02:12:33.321485 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 02:12:33.321672 kernel: audit: type=1130 audit(1734055953.315:1437): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.74:22-139.178.68.195:34862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:12:33.617000 audit[6303]: USER_ACCT pid=6303 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:33.618746 sshd[6303]: Accepted publickey for core from 139.178.68.195 port 34862 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:12:33.649271 kernel: audit: type=1101 audit(1734055953.617:1438): pid=6303 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:33.649209 sshd[6303]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:12:33.647000 audit[6303]: CRED_ACQ pid=6303 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:33.657885 systemd[1]: Started session-17.scope. Dec 13 02:12:33.659283 systemd-logind[1211]: New session 17 of user core. Dec 13 02:12:33.676936 kernel: audit: type=1103 audit(1734055953.647:1439): pid=6303 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:33.693632 kernel: audit: type=1006 audit(1734055953.648:1440): pid=6303 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Dec 13 02:12:33.693826 kernel: audit: type=1300 audit(1734055953.648:1440): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcccefd870 a2=3 a3=0 items=0 ppid=1 pid=6303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:33.648000 audit[6303]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcccefd870 a2=3 a3=0 items=0 ppid=1 pid=6303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:33.648000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:12:33.731017 kernel: audit: type=1327 audit(1734055953.648:1440): proctitle=737368643A20636F7265205B707269765D Dec 13 02:12:33.735780 kernel: audit: type=1105 audit(1734055953.677:1441): pid=6303 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:33.677000 audit[6303]: USER_START pid=6303 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:33.681000 audit[6318]: CRED_ACQ pid=6318 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:33.764603 kernel: audit: type=1103 audit(1734055953.681:1442): pid=6318 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:33.966311 sshd[6303]: pam_unix(sshd:session): session closed for user core Dec 13 02:12:33.968000 audit[6303]: USER_END pid=6303 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:33.972788 systemd[1]: sshd@17-10.128.0.74:22-139.178.68.195:34862.service: Deactivated successfully. Dec 13 02:12:33.974036 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 02:12:33.977477 systemd-logind[1211]: Session 17 logged out. Waiting for processes to exit. Dec 13 02:12:33.979240 systemd-logind[1211]: Removed session 17. Dec 13 02:12:33.969000 audit[6303]: CRED_DISP pid=6303 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:34.016012 systemd[1]: Started sshd@18-10.128.0.74:22-139.178.68.195:34876.service. Dec 13 02:12:34.026746 kernel: audit: type=1106 audit(1734055953.968:1443): pid=6303 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:34.026952 kernel: audit: type=1104 audit(1734055953.969:1444): pid=6303 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:33.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.74:22-139.178.68.195:34862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:12:34.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.74:22-139.178.68.195:34876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:12:34.321000 audit[6331]: USER_ACCT pid=6331 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:34.324075 sshd[6331]: Accepted publickey for core from 139.178.68.195 port 34876 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:12:34.323000 audit[6331]: CRED_ACQ pid=6331 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:34.324000 audit[6331]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4c5212d0 a2=3 a3=0 items=0 ppid=1 pid=6331 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:34.324000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:12:34.325257 sshd[6331]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:12:34.333343 systemd[1]: Started session-18.scope. Dec 13 02:12:34.335868 systemd-logind[1211]: New session 18 of user core. Dec 13 02:12:34.347000 audit[6331]: USER_START pid=6331 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:34.351000 audit[6338]: CRED_ACQ pid=6338 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:34.723747 sshd[6331]: pam_unix(sshd:session): session closed for user core Dec 13 02:12:34.725000 audit[6331]: USER_END pid=6331 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:34.725000 audit[6331]: CRED_DISP pid=6331 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:34.728625 systemd[1]: sshd@18-10.128.0.74:22-139.178.68.195:34876.service: Deactivated successfully. Dec 13 02:12:34.728000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.74:22-139.178.68.195:34876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:12:34.729902 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 02:12:34.730981 systemd-logind[1211]: Session 18 logged out. Waiting for processes to exit. Dec 13 02:12:34.732352 systemd-logind[1211]: Removed session 18. Dec 13 02:12:34.776391 systemd[1]: Started sshd@19-10.128.0.74:22-139.178.68.195:34880.service. Dec 13 02:12:34.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.74:22-139.178.68.195:34880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:12:35.071000 audit[6362]: USER_ACCT pid=6362 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:35.072156 sshd[6362]: Accepted publickey for core from 139.178.68.195 port 34880 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:12:35.073000 audit[6362]: CRED_ACQ pid=6362 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:35.073000 audit[6362]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd23bad910 a2=3 a3=0 items=0 ppid=1 pid=6362 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:35.073000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:12:35.074413 sshd[6362]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:12:35.081773 systemd[1]: Started session-19.scope. Dec 13 02:12:35.082449 systemd-logind[1211]: New session 19 of user core. Dec 13 02:12:35.090000 audit[6362]: USER_START pid=6362 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:35.093000 audit[6365]: CRED_ACQ pid=6365 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:37.573000 audit[6422]: NETFILTER_CFG table=filter:129 family=2 entries=22 op=nft_register_rule pid=6422 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:12:37.573000 audit[6422]: SYSCALL arch=c000003e syscall=46 success=yes exit=12688 a0=3 a1=7ffd25cbcab0 a2=0 a3=7ffd25cbca9c items=0 ppid=2179 pid=6422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:37.573000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:12:37.582000 audit[6422]: NETFILTER_CFG table=nat:130 family=2 entries=20 op=nft_register_rule pid=6422 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:12:37.582000 audit[6422]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd25cbcab0 a2=0 a3=0 items=0 ppid=2179 pid=6422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:37.582000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:12:37.620000 audit[6427]: NETFILTER_CFG table=filter:131 family=2 entries=34 op=nft_register_rule pid=6427 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:12:37.620000 audit[6427]: SYSCALL arch=c000003e syscall=46 success=yes exit=12688 a0=3 a1=7ffdf28a1170 a2=0 a3=7ffdf28a115c items=0 ppid=2179 pid=6427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:37.620000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:12:37.627203 sshd[6362]: pam_unix(sshd:session): session closed for user core Dec 13 02:12:37.629000 audit[6362]: USER_END pid=6362 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:37.630000 audit[6362]: CRED_DISP pid=6362 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:37.633497 systemd[1]: sshd@19-10.128.0.74:22-139.178.68.195:34880.service: Deactivated successfully. Dec 13 02:12:37.633000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.74:22-139.178.68.195:34880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:12:37.634797 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 02:12:37.635737 systemd-logind[1211]: Session 19 logged out. Waiting for processes to exit. Dec 13 02:12:37.637194 systemd-logind[1211]: Removed session 19. Dec 13 02:12:37.639000 audit[6427]: NETFILTER_CFG table=nat:132 family=2 entries=20 op=nft_register_rule pid=6427 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:12:37.639000 audit[6427]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffdf28a1170 a2=0 a3=0 items=0 ppid=2179 pid=6427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:37.639000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:12:37.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.74:22-139.178.68.195:42100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:12:37.676114 systemd[1]: Started sshd@20-10.128.0.74:22-139.178.68.195:42100.service. Dec 13 02:12:37.977000 audit[6435]: USER_ACCT pid=6435 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:37.978751 sshd[6435]: Accepted publickey for core from 139.178.68.195 port 42100 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:12:37.980000 audit[6435]: CRED_ACQ pid=6435 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:37.980000 audit[6435]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcfa511ee0 a2=3 a3=0 items=0 ppid=1 pid=6435 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:37.980000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:12:37.981314 sshd[6435]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:12:37.993495 systemd[1]: Started session-20.scope. Dec 13 02:12:37.994655 systemd-logind[1211]: New session 20 of user core. Dec 13 02:12:38.005000 audit[6435]: USER_START pid=6435 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:38.008000 audit[6446]: CRED_ACQ pid=6446 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:38.422147 sshd[6435]: pam_unix(sshd:session): session closed for user core Dec 13 02:12:38.435646 kernel: kauditd_printk_skb: 43 callbacks suppressed Dec 13 02:12:38.435795 kernel: audit: type=1106 audit(1734055958.423:1474): pid=6435 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:38.423000 audit[6435]: USER_END pid=6435 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:38.427794 systemd-logind[1211]: Session 20 logged out. Waiting for processes to exit. Dec 13 02:12:38.429225 systemd[1]: sshd@20-10.128.0.74:22-139.178.68.195:42100.service: Deactivated successfully. Dec 13 02:12:38.430490 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 02:12:38.432669 systemd-logind[1211]: Removed session 20. Dec 13 02:12:38.423000 audit[6435]: CRED_DISP pid=6435 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:38.474267 systemd[1]: Started sshd@21-10.128.0.74:22-139.178.68.195:42104.service. Dec 13 02:12:38.488328 kernel: audit: type=1104 audit(1734055958.423:1475): pid=6435 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:38.428000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.74:22-139.178.68.195:42100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:12:38.516973 kernel: audit: type=1131 audit(1734055958.428:1476): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.74:22-139.178.68.195:42100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:12:38.517137 kernel: audit: type=1130 audit(1734055958.479:1477): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.74:22-139.178.68.195:42104 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:12:38.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.74:22-139.178.68.195:42104 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:12:38.781000 audit[6454]: USER_ACCT pid=6454 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:38.812728 kernel: audit: type=1101 audit(1734055958.781:1478): pid=6454 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:38.812793 sshd[6454]: Accepted publickey for core from 139.178.68.195 port 42104 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:12:38.813675 sshd[6454]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:12:38.821909 systemd-logind[1211]: New session 21 of user core. Dec 13 02:12:38.824164 systemd[1]: Started session-21.scope. Dec 13 02:12:38.812000 audit[6454]: CRED_ACQ pid=6454 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:38.860604 kernel: audit: type=1103 audit(1734055958.812:1479): pid=6454 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:38.812000 audit[6454]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc04288b20 a2=3 a3=0 items=0 ppid=1 pid=6454 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:38.914852 kernel: audit: type=1006 audit(1734055958.812:1480): pid=6454 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Dec 13 02:12:38.915041 kernel: audit: type=1300 audit(1734055958.812:1480): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc04288b20 a2=3 a3=0 items=0 ppid=1 pid=6454 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:38.812000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:12:38.924543 kernel: audit: type=1327 audit(1734055958.812:1480): proctitle=737368643A20636F7265205B707269765D Dec 13 02:12:38.924752 kernel: audit: type=1105 audit(1734055958.833:1481): pid=6454 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:38.833000 audit[6454]: USER_START pid=6454 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:38.863000 audit[6469]: CRED_ACQ pid=6469 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:39.116129 sshd[6454]: pam_unix(sshd:session): session closed for user core Dec 13 02:12:39.118000 audit[6454]: USER_END pid=6454 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:39.118000 audit[6454]: CRED_DISP pid=6454 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:39.121426 systemd[1]: sshd@21-10.128.0.74:22-139.178.68.195:42104.service: Deactivated successfully. Dec 13 02:12:39.121000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.74:22-139.178.68.195:42104 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:12:39.122700 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 02:12:39.123791 systemd-logind[1211]: Session 21 logged out. Waiting for processes to exit. Dec 13 02:12:39.125249 systemd-logind[1211]: Removed session 21. Dec 13 02:12:40.723000 audit[6508]: NETFILTER_CFG table=filter:133 family=2 entries=33 op=nft_register_rule pid=6508 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:12:40.723000 audit[6508]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe0687d510 a2=0 a3=7ffe0687d4fc items=0 ppid=2179 pid=6508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:40.723000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:12:40.728000 audit[6508]: NETFILTER_CFG table=nat:134 family=2 entries=27 op=nft_register_chain pid=6508 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:12:40.728000 audit[6508]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe0687d510 a2=0 a3=0 items=0 ppid=2179 pid=6508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:40.728000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:12:41.464000 audit[6562]: AVC avc: denied { bpf } for pid=6562 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.464000 audit[6562]: AVC avc: denied { bpf } for pid=6562 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.464000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.464000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.464000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.464000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.464000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.464000 audit[6562]: AVC avc: denied { bpf } for pid=6562 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.464000 audit[6562]: AVC avc: denied { bpf } for pid=6562 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.464000 audit: BPF prog-id=238 op=LOAD Dec 13 02:12:41.464000 audit[6562]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffeb4b080c0 a2=98 a3=3 items=0 ppid=6547 pid=6562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.464000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:12:41.465000 audit: BPF prog-id=238 op=UNLOAD Dec 13 02:12:41.465000 audit[6562]: AVC avc: denied { bpf } for pid=6562 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.465000 audit[6562]: AVC avc: denied { bpf } for pid=6562 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.465000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.465000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.465000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.465000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.465000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.465000 audit[6562]: AVC avc: denied { bpf } for pid=6562 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.465000 audit[6562]: AVC avc: denied { bpf } for pid=6562 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.465000 audit: BPF prog-id=239 op=LOAD Dec 13 02:12:41.465000 audit[6562]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeb4b07ea0 a2=74 a3=540051 items=0 ppid=6547 pid=6562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.465000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:12:41.466000 audit: BPF prog-id=239 op=UNLOAD Dec 13 02:12:41.466000 audit[6562]: AVC avc: denied { bpf } for pid=6562 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.466000 audit[6562]: AVC avc: denied { bpf } for pid=6562 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.466000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.466000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.466000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.466000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.466000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.466000 audit[6562]: AVC avc: denied { bpf } for pid=6562 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.466000 audit[6562]: AVC avc: denied { bpf } for pid=6562 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.466000 audit: BPF prog-id=240 op=LOAD Dec 13 02:12:41.466000 audit[6562]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeb4b07ed0 a2=94 a3=2 items=0 ppid=6547 pid=6562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.466000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:12:41.467000 audit: BPF prog-id=240 op=UNLOAD Dec 13 02:12:41.605000 audit[6562]: AVC avc: denied { bpf } for pid=6562 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.605000 audit[6562]: AVC avc: denied { bpf } for pid=6562 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.605000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.605000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.605000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.605000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.605000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.605000 audit[6562]: AVC avc: denied { bpf } for pid=6562 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.605000 audit[6562]: AVC avc: denied { bpf } for pid=6562 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.605000 audit: BPF prog-id=241 op=LOAD Dec 13 02:12:41.605000 audit[6562]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeb4b07d90 a2=40 a3=1 items=0 ppid=6547 pid=6562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.605000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:12:41.606000 audit: BPF prog-id=241 op=UNLOAD Dec 13 02:12:41.606000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.606000 audit[6562]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffeb4b07e60 a2=50 a3=7ffeb4b07f40 items=0 ppid=6547 pid=6562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.606000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:12:41.619000 audit[6562]: AVC avc: denied { bpf } for pid=6562 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.619000 audit[6562]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb4b07da0 a2=28 a3=0 items=0 ppid=6547 pid=6562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.619000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:12:41.619000 audit[6562]: AVC avc: denied { bpf } for pid=6562 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.619000 audit[6562]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb4b07dd0 a2=28 a3=0 items=0 ppid=6547 pid=6562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.619000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:12:41.619000 audit[6562]: AVC avc: denied { bpf } for pid=6562 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.619000 audit[6562]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb4b07ce0 a2=28 a3=0 items=0 ppid=6547 pid=6562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.619000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:12:41.619000 audit[6562]: AVC avc: denied { bpf } for pid=6562 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.619000 audit[6562]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb4b07df0 a2=28 a3=0 items=0 ppid=6547 pid=6562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.619000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:12:41.619000 audit[6562]: AVC avc: denied { bpf } for pid=6562 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.619000 audit[6562]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb4b07dd0 a2=28 a3=0 items=0 ppid=6547 pid=6562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.619000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:12:41.619000 audit[6562]: AVC avc: denied { bpf } for pid=6562 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.619000 audit[6562]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb4b07dc0 a2=28 a3=0 items=0 ppid=6547 pid=6562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.619000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:12:41.619000 audit[6562]: AVC avc: denied { bpf } for pid=6562 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.619000 audit[6562]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb4b07df0 a2=28 a3=0 items=0 ppid=6547 pid=6562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.619000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:12:41.619000 audit[6562]: AVC avc: denied { bpf } for pid=6562 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.619000 audit[6562]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb4b07dd0 a2=28 a3=0 items=0 ppid=6547 pid=6562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.619000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:12:41.619000 audit[6562]: AVC avc: denied { bpf } for pid=6562 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.619000 audit[6562]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb4b07df0 a2=28 a3=0 items=0 ppid=6547 pid=6562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.619000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:12:41.619000 audit[6562]: AVC avc: denied { bpf } for pid=6562 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.619000 audit[6562]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb4b07dc0 a2=28 a3=0 items=0 ppid=6547 pid=6562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.619000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:12:41.619000 audit[6562]: AVC avc: denied { bpf } for pid=6562 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.619000 audit[6562]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb4b07e30 a2=28 a3=0 items=0 ppid=6547 pid=6562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.619000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:12:41.619000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.619000 audit[6562]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffeb4b07be0 a2=50 a3=1 items=0 ppid=6547 pid=6562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.619000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:12:41.619000 audit[6562]: AVC avc: denied { bpf } for pid=6562 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.619000 audit[6562]: AVC avc: denied { bpf } for pid=6562 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.619000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.619000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.619000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.619000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.619000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.619000 audit[6562]: AVC avc: denied { bpf } for pid=6562 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.619000 audit[6562]: AVC avc: denied { bpf } for pid=6562 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.619000 audit: BPF prog-id=242 op=LOAD Dec 13 02:12:41.619000 audit[6562]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffeb4b07be0 a2=94 a3=5 items=0 ppid=6547 pid=6562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.619000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:12:41.619000 audit: BPF prog-id=242 op=UNLOAD Dec 13 02:12:41.619000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.619000 audit[6562]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffeb4b07c90 a2=50 a3=1 items=0 ppid=6547 pid=6562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.619000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:12:41.619000 audit[6562]: AVC avc: denied { bpf } for pid=6562 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.619000 audit[6562]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffeb4b07db0 a2=4 a3=38 items=0 ppid=6547 pid=6562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.619000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:12:41.619000 audit[6562]: AVC avc: denied { bpf } for pid=6562 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.619000 audit[6562]: AVC avc: denied { bpf } for pid=6562 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.619000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.619000 audit[6562]: AVC avc: denied { bpf } for pid=6562 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.619000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.619000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.619000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.619000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.619000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.619000 audit[6562]: AVC avc: denied { bpf } for pid=6562 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.619000 audit[6562]: AVC avc: denied { confidentiality } for pid=6562 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:12:41.619000 audit[6562]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffeb4b07e00 a2=94 a3=6 items=0 ppid=6547 pid=6562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.619000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:12:41.620000 audit[6562]: AVC avc: denied { bpf } for pid=6562 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.620000 audit[6562]: AVC avc: denied { bpf } for pid=6562 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.620000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.620000 audit[6562]: AVC avc: denied { bpf } for pid=6562 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.620000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.620000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.620000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.620000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.620000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.620000 audit[6562]: AVC avc: denied { bpf } for pid=6562 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.620000 audit[6562]: AVC avc: denied { confidentiality } for pid=6562 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:12:41.620000 audit[6562]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffeb4b075b0 a2=94 a3=83 items=0 ppid=6547 pid=6562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.620000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:12:41.620000 audit[6562]: AVC avc: denied { bpf } for pid=6562 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.620000 audit[6562]: AVC avc: denied { bpf } for pid=6562 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.620000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.620000 audit[6562]: AVC avc: denied { bpf } for pid=6562 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.620000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.620000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.620000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.620000 audit[6562]: AVC avc: denied { perfmon } for pid=6562 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.620000 audit[6562]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffeb4b075b0 a2=94 a3=83 items=0 ppid=6547 pid=6562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.620000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:12:41.634000 audit[6565]: AVC avc: denied { bpf } for pid=6565 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.634000 audit[6565]: AVC avc: denied { bpf } for pid=6565 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.634000 audit[6565]: AVC avc: denied { perfmon } for pid=6565 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.634000 audit[6565]: AVC avc: denied { perfmon } for pid=6565 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.634000 audit[6565]: AVC avc: denied { perfmon } for pid=6565 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.634000 audit[6565]: AVC avc: denied { perfmon } for pid=6565 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.634000 audit[6565]: AVC avc: denied { perfmon } for pid=6565 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.634000 audit[6565]: AVC avc: denied { bpf } for pid=6565 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.634000 audit[6565]: AVC avc: denied { bpf } for pid=6565 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.634000 audit: BPF prog-id=243 op=LOAD Dec 13 02:12:41.634000 audit[6565]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcebf3ccd0 a2=98 a3=1999999999999999 items=0 ppid=6547 pid=6565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.634000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:12:41.634000 audit: BPF prog-id=243 op=UNLOAD Dec 13 02:12:41.635000 audit[6565]: AVC avc: denied { bpf } for pid=6565 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.635000 audit[6565]: AVC avc: denied { bpf } for pid=6565 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.635000 audit[6565]: AVC avc: denied { perfmon } for pid=6565 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.635000 audit[6565]: AVC avc: denied { perfmon } for pid=6565 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.635000 audit[6565]: AVC avc: denied { perfmon } for pid=6565 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.635000 audit[6565]: AVC avc: denied { perfmon } for pid=6565 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.635000 audit[6565]: AVC avc: denied { perfmon } for pid=6565 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.635000 audit[6565]: AVC avc: denied { bpf } for pid=6565 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.635000 audit[6565]: AVC avc: denied { bpf } for pid=6565 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.635000 audit: BPF prog-id=244 op=LOAD Dec 13 02:12:41.635000 audit[6565]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcebf3cbb0 a2=74 a3=ffff items=0 ppid=6547 pid=6565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.635000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:12:41.635000 audit: BPF prog-id=244 op=UNLOAD Dec 13 02:12:41.635000 audit[6565]: AVC avc: denied { bpf } for pid=6565 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.635000 audit[6565]: AVC avc: denied { bpf } for pid=6565 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.635000 audit[6565]: AVC avc: denied { perfmon } for pid=6565 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.635000 audit[6565]: AVC avc: denied { perfmon } for pid=6565 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.635000 audit[6565]: AVC avc: denied { perfmon } for pid=6565 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.635000 audit[6565]: AVC avc: denied { perfmon } for pid=6565 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.635000 audit[6565]: AVC avc: denied { perfmon } for pid=6565 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.635000 audit[6565]: AVC avc: denied { bpf } for pid=6565 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.635000 audit[6565]: AVC avc: denied { bpf } for pid=6565 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.635000 audit: BPF prog-id=245 op=LOAD Dec 13 02:12:41.635000 audit[6565]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcebf3cbf0 a2=40 a3=7ffcebf3cdd0 items=0 ppid=6547 pid=6565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.635000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:12:41.636000 audit: BPF prog-id=245 op=UNLOAD Dec 13 02:12:41.763000 audit[6589]: AVC avc: denied { bpf } for pid=6589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.763000 audit[6589]: AVC avc: denied { bpf } for pid=6589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.763000 audit[6589]: AVC avc: denied { perfmon } for pid=6589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.763000 audit[6589]: AVC avc: denied { perfmon } for pid=6589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.763000 audit[6589]: AVC avc: denied { perfmon } for pid=6589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.763000 audit[6589]: AVC avc: denied { perfmon } for pid=6589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.763000 audit[6589]: AVC avc: denied { perfmon } for pid=6589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.763000 audit[6589]: AVC avc: denied { bpf } for pid=6589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.763000 audit[6589]: AVC avc: denied { bpf } for pid=6589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.763000 audit: BPF prog-id=246 op=LOAD Dec 13 02:12:41.763000 audit[6589]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff615c9bb0 a2=98 a3=ffffffff items=0 ppid=6547 pid=6589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.763000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:12:41.776000 audit: BPF prog-id=246 op=UNLOAD Dec 13 02:12:41.776000 audit[6589]: AVC avc: denied { bpf } for pid=6589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.776000 audit[6589]: AVC avc: denied { bpf } for pid=6589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.776000 audit[6589]: AVC avc: denied { perfmon } for pid=6589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.776000 audit[6589]: AVC avc: denied { perfmon } for pid=6589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.776000 audit[6589]: AVC avc: denied { perfmon } for pid=6589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.776000 audit[6589]: AVC avc: denied { perfmon } for pid=6589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.776000 audit[6589]: AVC avc: denied { perfmon } for pid=6589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.776000 audit[6589]: AVC avc: denied { bpf } for pid=6589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.776000 audit[6589]: AVC avc: denied { bpf } for pid=6589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.776000 audit: BPF prog-id=247 op=LOAD Dec 13 02:12:41.776000 audit[6589]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff615c99c0 a2=74 a3=540051 items=0 ppid=6547 pid=6589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.776000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:12:41.776000 audit: BPF prog-id=247 op=UNLOAD Dec 13 02:12:41.776000 audit[6589]: AVC avc: denied { bpf } for pid=6589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.776000 audit[6589]: AVC avc: denied { bpf } for pid=6589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.776000 audit[6589]: AVC avc: denied { perfmon } for pid=6589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.776000 audit[6589]: AVC avc: denied { perfmon } for pid=6589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.776000 audit[6589]: AVC avc: denied { perfmon } for pid=6589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.776000 audit[6589]: AVC avc: denied { perfmon } for pid=6589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.776000 audit[6589]: AVC avc: denied { perfmon } for pid=6589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.776000 audit[6589]: AVC avc: denied { bpf } for pid=6589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.776000 audit[6589]: AVC avc: denied { bpf } for pid=6589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.776000 audit: BPF prog-id=248 op=LOAD Dec 13 02:12:41.776000 audit[6589]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff615c99f0 a2=94 a3=2 items=0 ppid=6547 pid=6589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.776000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:12:41.777000 audit: BPF prog-id=248 op=UNLOAD Dec 13 02:12:41.777000 audit[6589]: AVC avc: denied { bpf } for pid=6589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.777000 audit[6589]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff615c98c0 a2=28 a3=0 items=0 ppid=6547 pid=6589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.777000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:12:41.777000 audit[6589]: AVC avc: denied { bpf } for pid=6589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.777000 audit[6589]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff615c98f0 a2=28 a3=0 items=0 ppid=6547 pid=6589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.777000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:12:41.777000 audit[6589]: AVC avc: denied { bpf } for pid=6589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.777000 audit[6589]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff615c9800 a2=28 a3=0 items=0 ppid=6547 pid=6589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.777000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:12:41.777000 audit[6589]: AVC avc: denied { bpf } for pid=6589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.777000 audit[6589]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff615c9910 a2=28 a3=0 items=0 ppid=6547 pid=6589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.777000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:12:41.777000 audit[6589]: AVC avc: denied { bpf } for pid=6589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.777000 audit[6589]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff615c98f0 a2=28 a3=0 items=0 ppid=6547 pid=6589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.777000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:12:41.777000 audit[6589]: AVC avc: denied { bpf } for pid=6589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.777000 audit[6589]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff615c98e0 a2=28 a3=0 items=0 ppid=6547 pid=6589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.777000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:12:41.777000 audit[6589]: AVC avc: denied { bpf } for pid=6589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.777000 audit[6589]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff615c9910 a2=28 a3=0 items=0 ppid=6547 pid=6589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.777000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:12:41.777000 audit[6589]: AVC avc: denied { bpf } for pid=6589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.777000 audit[6589]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff615c98f0 a2=28 a3=0 items=0 ppid=6547 pid=6589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.777000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:12:41.777000 audit[6589]: AVC avc: denied { bpf } for pid=6589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.777000 audit[6589]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff615c9910 a2=28 a3=0 items=0 ppid=6547 pid=6589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.777000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:12:41.780000 audit[6589]: AVC avc: denied { bpf } for pid=6589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.780000 audit[6589]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff615c98e0 a2=28 a3=0 items=0 ppid=6547 pid=6589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.780000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:12:41.780000 audit[6589]: AVC avc: denied { bpf } for pid=6589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.780000 audit[6589]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff615c9950 a2=28 a3=0 items=0 ppid=6547 pid=6589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.780000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:12:41.780000 audit[6589]: AVC avc: denied { bpf } for pid=6589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.780000 audit[6589]: AVC avc: denied { bpf } for pid=6589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.780000 audit[6589]: AVC avc: denied { perfmon } for pid=6589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.780000 audit[6589]: AVC avc: denied { perfmon } for pid=6589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.780000 audit[6589]: AVC avc: denied { perfmon } for pid=6589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.780000 audit[6589]: AVC avc: denied { perfmon } for pid=6589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.780000 audit[6589]: AVC avc: denied { perfmon } for pid=6589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.780000 audit[6589]: AVC avc: denied { bpf } for pid=6589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.780000 audit[6589]: AVC avc: denied { bpf } for pid=6589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.780000 audit: BPF prog-id=249 op=LOAD Dec 13 02:12:41.780000 audit[6589]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff615c97c0 a2=40 a3=0 items=0 ppid=6547 pid=6589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.780000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:12:41.780000 audit: BPF prog-id=249 op=UNLOAD Dec 13 02:12:41.781000 audit[6589]: AVC avc: denied { bpf } for pid=6589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.781000 audit[6589]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff615c97b0 a2=50 a3=2800 items=0 ppid=6547 pid=6589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.781000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:12:41.781000 audit[6589]: AVC avc: denied { bpf } for pid=6589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.781000 audit[6589]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fff615c97b0 a2=50 a3=2800 items=0 ppid=6547 pid=6589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.781000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:12:41.781000 audit[6589]: AVC avc: denied { bpf } for pid=6589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.781000 audit[6589]: AVC avc: denied { bpf } for pid=6589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.781000 audit[6589]: AVC avc: denied { bpf } for pid=6589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.781000 audit[6589]: AVC avc: denied { perfmon } for pid=6589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.781000 audit[6589]: AVC avc: denied { perfmon } for pid=6589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.781000 audit[6589]: AVC avc: denied { perfmon } for pid=6589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.781000 audit[6589]: AVC avc: denied { perfmon } for pid=6589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.781000 audit[6589]: AVC avc: denied { perfmon } for pid=6589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.781000 audit[6589]: AVC avc: denied { bpf } for pid=6589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.781000 audit[6589]: AVC avc: denied { bpf } for pid=6589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.781000 audit: BPF prog-id=250 op=LOAD Dec 13 02:12:41.781000 audit[6589]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff615c8fd0 a2=94 a3=2 items=0 ppid=6547 pid=6589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.781000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:12:41.781000 audit: BPF prog-id=250 op=UNLOAD Dec 13 02:12:41.781000 audit[6589]: AVC avc: denied { bpf } for pid=6589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.781000 audit[6589]: AVC avc: denied { bpf } for pid=6589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.781000 audit[6589]: AVC avc: denied { bpf } for pid=6589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.781000 audit[6589]: AVC avc: denied { perfmon } for pid=6589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.781000 audit[6589]: AVC avc: denied { perfmon } for pid=6589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.781000 audit[6589]: AVC avc: denied { perfmon } for pid=6589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.781000 audit[6589]: AVC avc: denied { perfmon } for pid=6589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.781000 audit[6589]: AVC avc: denied { perfmon } for pid=6589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.781000 audit[6589]: AVC avc: denied { bpf } for pid=6589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.781000 audit[6589]: AVC avc: denied { bpf } for pid=6589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.781000 audit: BPF prog-id=251 op=LOAD Dec 13 02:12:41.781000 audit[6589]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff615c90d0 a2=94 a3=2d items=0 ppid=6547 pid=6589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.781000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:12:41.790000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.790000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.790000 audit[6595]: AVC avc: denied { perfmon } for pid=6595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.790000 audit[6595]: AVC avc: denied { perfmon } for pid=6595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.790000 audit[6595]: AVC avc: denied { perfmon } for pid=6595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.790000 audit[6595]: AVC avc: denied { perfmon } for pid=6595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.790000 audit[6595]: AVC avc: denied { perfmon } for pid=6595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.790000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.790000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.790000 audit: BPF prog-id=252 op=LOAD Dec 13 02:12:41.790000 audit[6595]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdf01d1860 a2=98 a3=0 items=0 ppid=6547 pid=6595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.790000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:12:41.790000 audit: BPF prog-id=252 op=UNLOAD Dec 13 02:12:41.790000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.790000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.790000 audit[6595]: AVC avc: denied { perfmon } for pid=6595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.790000 audit[6595]: AVC avc: denied { perfmon } for pid=6595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.790000 audit[6595]: AVC avc: denied { perfmon } for pid=6595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.790000 audit[6595]: AVC avc: denied { perfmon } for pid=6595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.790000 audit[6595]: AVC avc: denied { perfmon } for pid=6595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.790000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.790000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.790000 audit: BPF prog-id=253 op=LOAD Dec 13 02:12:41.790000 audit[6595]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdf01d1640 a2=74 a3=540051 items=0 ppid=6547 pid=6595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.790000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:12:41.790000 audit: BPF prog-id=253 op=UNLOAD Dec 13 02:12:41.790000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.790000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.790000 audit[6595]: AVC avc: denied { perfmon } for pid=6595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.790000 audit[6595]: AVC avc: denied { perfmon } for pid=6595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.790000 audit[6595]: AVC avc: denied { perfmon } for pid=6595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.790000 audit[6595]: AVC avc: denied { perfmon } for pid=6595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.790000 audit[6595]: AVC avc: denied { perfmon } for pid=6595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.790000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.790000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.790000 audit: BPF prog-id=254 op=LOAD Dec 13 02:12:41.790000 audit[6595]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdf01d1670 a2=94 a3=2 items=0 ppid=6547 pid=6595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.790000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:12:41.790000 audit: BPF prog-id=254 op=UNLOAD Dec 13 02:12:41.934000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.934000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.934000 audit[6595]: AVC avc: denied { perfmon } for pid=6595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.934000 audit[6595]: AVC avc: denied { perfmon } for pid=6595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.934000 audit[6595]: AVC avc: denied { perfmon } for pid=6595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.934000 audit[6595]: AVC avc: denied { perfmon } for pid=6595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.934000 audit[6595]: AVC avc: denied { perfmon } for pid=6595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.934000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.934000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.934000 audit: BPF prog-id=255 op=LOAD Dec 13 02:12:41.934000 audit[6595]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdf01d1530 a2=40 a3=1 items=0 ppid=6547 pid=6595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.934000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:12:41.934000 audit: BPF prog-id=255 op=UNLOAD Dec 13 02:12:41.934000 audit[6595]: AVC avc: denied { perfmon } for pid=6595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.934000 audit[6595]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdf01d1600 a2=50 a3=7ffdf01d16e0 items=0 ppid=6547 pid=6595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.934000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:12:41.947000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.947000 audit[6595]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdf01d1540 a2=28 a3=0 items=0 ppid=6547 pid=6595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:12:41.947000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.947000 audit[6595]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdf01d1570 a2=28 a3=0 items=0 ppid=6547 pid=6595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:12:41.947000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.947000 audit[6595]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdf01d1480 a2=28 a3=0 items=0 ppid=6547 pid=6595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:12:41.947000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.947000 audit[6595]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdf01d1590 a2=28 a3=0 items=0 ppid=6547 pid=6595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:12:41.947000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.947000 audit[6595]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdf01d1570 a2=28 a3=0 items=0 ppid=6547 pid=6595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:12:41.947000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.947000 audit[6595]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdf01d1560 a2=28 a3=0 items=0 ppid=6547 pid=6595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:12:41.947000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.947000 audit[6595]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdf01d1590 a2=28 a3=0 items=0 ppid=6547 pid=6595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:12:41.947000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.947000 audit[6595]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdf01d1570 a2=28 a3=0 items=0 ppid=6547 pid=6595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:12:41.947000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.947000 audit[6595]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdf01d1590 a2=28 a3=0 items=0 ppid=6547 pid=6595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:12:41.947000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.947000 audit[6595]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdf01d1560 a2=28 a3=0 items=0 ppid=6547 pid=6595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:12:41.947000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.947000 audit[6595]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdf01d15d0 a2=28 a3=0 items=0 ppid=6547 pid=6595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:12:41.947000 audit[6595]: AVC avc: denied { perfmon } for pid=6595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.947000 audit[6595]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdf01d1380 a2=50 a3=1 items=0 ppid=6547 pid=6595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:12:41.947000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.947000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.947000 audit[6595]: AVC avc: denied { perfmon } for pid=6595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.947000 audit[6595]: AVC avc: denied { perfmon } for pid=6595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.947000 audit[6595]: AVC avc: denied { perfmon } for pid=6595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.947000 audit[6595]: AVC avc: denied { perfmon } for pid=6595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.947000 audit[6595]: AVC avc: denied { perfmon } for pid=6595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.947000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.947000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.947000 audit: BPF prog-id=256 op=LOAD Dec 13 02:12:41.947000 audit[6595]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdf01d1380 a2=94 a3=5 items=0 ppid=6547 pid=6595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:12:41.947000 audit: BPF prog-id=256 op=UNLOAD Dec 13 02:12:41.947000 audit[6595]: AVC avc: denied { perfmon } for pid=6595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.947000 audit[6595]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdf01d1430 a2=50 a3=1 items=0 ppid=6547 pid=6595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:12:41.947000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.947000 audit[6595]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffdf01d1550 a2=4 a3=38 items=0 ppid=6547 pid=6595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:12:41.947000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.947000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.947000 audit[6595]: AVC avc: denied { perfmon } for pid=6595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.947000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.947000 audit[6595]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdf01d15a0 a2=94 a3=6 items=0 ppid=6547 pid=6595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:12:41.948000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.948000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.948000 audit[6595]: AVC avc: denied { perfmon } for pid=6595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.948000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.948000 audit[6595]: AVC avc: denied { perfmon } for pid=6595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.948000 audit[6595]: AVC avc: denied { perfmon } for pid=6595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.948000 audit[6595]: AVC avc: denied { perfmon } for pid=6595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.948000 audit[6595]: AVC avc: denied { perfmon } for pid=6595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.948000 audit[6595]: AVC avc: denied { perfmon } for pid=6595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.948000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.948000 audit[6595]: AVC avc: denied { confidentiality } for pid=6595 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:12:41.948000 audit[6595]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdf01d0d50 a2=94 a3=83 items=0 ppid=6547 pid=6595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.948000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:12:41.948000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.948000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.948000 audit[6595]: AVC avc: denied { perfmon } for pid=6595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.948000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.948000 audit[6595]: AVC avc: denied { perfmon } for pid=6595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.948000 audit[6595]: AVC avc: denied { perfmon } for pid=6595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.948000 audit[6595]: AVC avc: denied { perfmon } for pid=6595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.948000 audit[6595]: AVC avc: denied { perfmon } for pid=6595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.948000 audit[6595]: AVC avc: denied { perfmon } for pid=6595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.948000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.948000 audit[6595]: AVC avc: denied { confidentiality } for pid=6595 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:12:41.948000 audit[6595]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdf01d0d50 a2=94 a3=83 items=0 ppid=6547 pid=6595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.948000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:12:41.949000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.949000 audit[6595]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdf01d2790 a2=10 a3=f1f00800 items=0 ppid=6547 pid=6595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.949000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:12:41.949000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.949000 audit[6595]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdf01d2630 a2=10 a3=3 items=0 ppid=6547 pid=6595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.949000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:12:41.949000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.949000 audit[6595]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdf01d25d0 a2=10 a3=3 items=0 ppid=6547 pid=6595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.949000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:12:41.949000 audit[6595]: AVC avc: denied { bpf } for pid=6595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:12:41.949000 audit[6595]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdf01d25d0 a2=10 a3=7 items=0 ppid=6547 pid=6595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:41.949000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:12:41.957000 audit: BPF prog-id=251 op=UNLOAD Dec 13 02:12:42.043000 audit[6630]: NETFILTER_CFG table=filter:135 family=2 entries=66 op=nft_register_chain pid=6630 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:12:42.043000 audit[6630]: SYSCALL arch=c000003e syscall=46 success=yes exit=22192 a0=3 a1=7fff59594300 a2=0 a3=7fff595942ec items=0 ppid=6547 pid=6630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:42.043000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:12:42.045000 audit[6630]: NETFILTER_CFG table=filter:136 family=2 entries=2 op=nft_unregister_chain pid=6630 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:12:42.045000 audit[6630]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fff59594300 a2=0 a3=562a05dda000 items=0 ppid=6547 pid=6630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:42.045000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:12:44.164818 systemd[1]: Started sshd@22-10.128.0.74:22-139.178.68.195:42112.service. Dec 13 02:12:44.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.74:22-139.178.68.195:42112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:12:44.170701 kernel: kauditd_printk_skb: 504 callbacks suppressed Dec 13 02:12:44.170801 kernel: audit: type=1130 audit(1734055964.163:1581): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.74:22-139.178.68.195:42112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:12:44.298000 audit[4032]: AVC avc: denied { watch } for pid=4032 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_11_23.3242189021/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c555,c853 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c555,c853 tclass=file permissive=0 Dec 13 02:12:44.332230 kernel: audit: type=1400 audit(1734055964.298:1582): avc: denied { watch } for pid=4032 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_11_23.3242189021/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c555,c853 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c555,c853 tclass=file permissive=0 Dec 13 02:12:44.332450 kernel: audit: type=1300 audit(1734055964.298:1582): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c002270c20 a2=fc6 a3=0 items=0 ppid=3670 pid=4032 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c555,c853 key=(null) Dec 13 02:12:44.298000 audit[4032]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c002270c20 a2=fc6 a3=0 items=0 ppid=3670 pid=4032 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c555,c853 key=(null) Dec 13 02:12:44.377075 kernel: audit: type=1327 audit(1734055964.298:1582): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:12:44.298000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:12:44.482000 audit[6634]: USER_ACCT pid=6634 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:44.485695 sshd[6634]: Accepted publickey for core from 139.178.68.195 port 42112 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:12:44.514649 kernel: audit: type=1101 audit(1734055964.482:1583): pid=6634 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:44.514977 sshd[6634]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:12:44.523478 systemd[1]: Started session-22.scope. Dec 13 02:12:44.525168 systemd-logind[1211]: New session 22 of user core. Dec 13 02:12:44.512000 audit[6634]: CRED_ACQ pid=6634 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:44.558597 kernel: audit: type=1103 audit(1734055964.512:1584): pid=6634 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:44.559845 kernel: audit: type=1006 audit(1734055964.512:1585): pid=6634 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Dec 13 02:12:44.512000 audit[6634]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2ffa6ae0 a2=3 a3=0 items=0 ppid=1 pid=6634 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:44.603110 kernel: audit: type=1300 audit(1734055964.512:1585): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2ffa6ae0 a2=3 a3=0 items=0 ppid=1 pid=6634 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:44.603382 kernel: audit: type=1327 audit(1734055964.512:1585): proctitle=737368643A20636F7265205B707269765D Dec 13 02:12:44.512000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:12:44.562000 audit[6634]: USER_START pid=6634 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:44.645147 kernel: audit: type=1105 audit(1734055964.562:1586): pid=6634 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:44.567000 audit[6636]: CRED_ACQ pid=6636 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:44.827892 sshd[6634]: pam_unix(sshd:session): session closed for user core Dec 13 02:12:44.828000 audit[6634]: USER_END pid=6634 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:44.828000 audit[6634]: CRED_DISP pid=6634 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:44.833324 systemd-logind[1211]: Session 22 logged out. Waiting for processes to exit. Dec 13 02:12:44.836290 systemd[1]: sshd@22-10.128.0.74:22-139.178.68.195:42112.service: Deactivated successfully. Dec 13 02:12:44.835000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.74:22-139.178.68.195:42112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:12:44.837551 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 02:12:44.841128 systemd-logind[1211]: Removed session 22. Dec 13 02:12:45.140000 audit[6646]: NETFILTER_CFG table=filter:137 family=2 entries=20 op=nft_register_rule pid=6646 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:12:45.140000 audit[6646]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffec5dc4c30 a2=0 a3=7ffec5dc4c1c items=0 ppid=2179 pid=6646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:45.140000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:12:45.146000 audit[6646]: NETFILTER_CFG table=nat:138 family=2 entries=106 op=nft_register_chain pid=6646 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:12:45.146000 audit[6646]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffec5dc4c30 a2=0 a3=7ffec5dc4c1c items=0 ppid=2179 pid=6646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:45.146000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:12:47.903000 audit[4181]: AVC avc: denied { watch } for pid=4181 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_11_23.1859003455/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c119,c663 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c119,c663 tclass=file permissive=0 Dec 13 02:12:47.903000 audit[4181]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0017faf60 a2=fc6 a3=0 items=0 ppid=3767 pid=4181 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c119,c663 key=(null) Dec 13 02:12:47.903000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:12:49.876536 systemd[1]: Started sshd@23-10.128.0.74:22-139.178.68.195:43614.service. Dec 13 02:12:49.914637 kernel: kauditd_printk_skb: 13 callbacks suppressed Dec 13 02:12:49.914822 kernel: audit: type=1130 audit(1734055969.882:1594): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.74:22-139.178.68.195:43614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:12:49.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.74:22-139.178.68.195:43614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:12:50.179000 audit[6658]: USER_ACCT pid=6658 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:50.210711 kernel: audit: type=1101 audit(1734055970.179:1595): pid=6658 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:50.210834 sshd[6658]: Accepted publickey for core from 139.178.68.195 port 43614 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:12:50.212078 sshd[6658]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:12:50.209000 audit[6658]: CRED_ACQ pid=6658 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:50.245782 kernel: audit: type=1103 audit(1734055970.209:1596): pid=6658 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:50.245963 kernel: audit: type=1006 audit(1734055970.209:1597): pid=6658 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Dec 13 02:12:50.246173 systemd-logind[1211]: New session 23 of user core. Dec 13 02:12:50.249156 systemd[1]: Started session-23.scope. Dec 13 02:12:50.263297 kernel: audit: type=1300 audit(1734055970.209:1597): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf7d12160 a2=3 a3=0 items=0 ppid=1 pid=6658 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:50.209000 audit[6658]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf7d12160 a2=3 a3=0 items=0 ppid=1 pid=6658 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:50.209000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:12:50.211000 audit[1874]: AVC avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:12:50.328893 kernel: audit: type=1327 audit(1734055970.209:1597): proctitle=737368643A20636F7265205B707269765D Dec 13 02:12:50.329095 kernel: audit: type=1400 audit(1734055970.211:1598): avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:12:50.329151 kernel: audit: type=1300 audit(1734055970.211:1598): arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c0129f7920 a2=fc6 a3=0 items=0 ppid=1759 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 key=(null) Dec 13 02:12:50.211000 audit[1874]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c0129f7920 a2=fc6 a3=0 items=0 ppid=1759 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 key=(null) Dec 13 02:12:50.211000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3734002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:12:50.391716 kernel: audit: type=1327 audit(1734055970.211:1598): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3734002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:12:50.391878 kernel: audit: type=1400 audit(1734055970.213:1599): avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:12:50.213000 audit[1874]: AVC avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:12:50.213000 audit[1874]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c00f4be0c0 a2=fc6 a3=0 items=0 ppid=1759 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 key=(null) Dec 13 02:12:50.213000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3734002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:12:50.215000 audit[1874]: AVC avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7318 scontext=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:12:50.215000 audit[1874]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c0129f7a40 a2=fc6 a3=0 items=0 ppid=1759 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 key=(null) Dec 13 02:12:50.215000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3734002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:12:50.242000 audit[1874]: AVC avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7320 scontext=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:12:50.242000 audit[1874]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c012a085a0 a2=fc6 a3=0 items=0 ppid=1759 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 key=(null) Dec 13 02:12:50.242000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3734002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:12:50.242000 audit[1874]: AVC avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:12:50.242000 audit[1874]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c00d74d780 a2=fc6 a3=0 items=0 ppid=1759 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 key=(null) Dec 13 02:12:50.242000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3734002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:12:50.254000 audit[6658]: USER_START pid=6658 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:50.254000 audit[1874]: AVC avc: denied { watch } for pid=1874 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7318 scontext=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:12:50.254000 audit[1874]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c012a087e0 a2=fc6 a3=0 items=0 ppid=1759 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c487,c703 key=(null) Dec 13 02:12:50.254000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3734002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:12:50.265000 audit[6660]: CRED_ACQ pid=6660 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:50.606987 sshd[6658]: pam_unix(sshd:session): session closed for user core Dec 13 02:12:50.608000 audit[6658]: USER_END pid=6658 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:50.608000 audit[6658]: CRED_DISP pid=6658 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:50.613205 systemd[1]: sshd@23-10.128.0.74:22-139.178.68.195:43614.service: Deactivated successfully. Dec 13 02:12:50.611000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.74:22-139.178.68.195:43614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:12:50.614473 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 02:12:50.615539 systemd-logind[1211]: Session 23 logged out. Waiting for processes to exit. Dec 13 02:12:50.617144 systemd-logind[1211]: Removed session 23. Dec 13 02:12:51.689000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7318 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:12:51.689000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:12:51.689000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000b80080 a2=fc6 a3=0 items=0 ppid=1751 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 key=(null) Dec 13 02:12:51.689000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:12:51.689000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00196cba0 a2=fc6 a3=0 items=0 ppid=1751 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 key=(null) Dec 13 02:12:51.689000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:12:52.125274 systemd[1]: run-containerd-runc-k8s.io-03a167270979fe02c4e4978919996a1c898f440300afbc066b151c30d9b934ff-runc.S3z9mY.mount: Deactivated successfully. Dec 13 02:12:55.654079 systemd[1]: Started sshd@24-10.128.0.74:22-139.178.68.195:43622.service. Dec 13 02:12:55.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.128.0.74:22-139.178.68.195:43622 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:12:55.662687 kernel: kauditd_printk_skb: 25 callbacks suppressed Dec 13 02:12:55.662805 kernel: audit: type=1130 audit(1734055975.656:1611): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.128.0.74:22-139.178.68.195:43622 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:12:55.953000 audit[6701]: USER_ACCT pid=6701 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:55.984159 sshd[6701]: Accepted publickey for core from 139.178.68.195 port 43622 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:12:55.984630 kernel: audit: type=1101 audit(1734055975.953:1612): pid=6701 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:55.985062 sshd[6701]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:12:55.983000 audit[6701]: CRED_ACQ pid=6701 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:55.994331 systemd[1]: Started session-24.scope. Dec 13 02:12:55.997392 systemd-logind[1211]: New session 24 of user core. Dec 13 02:12:56.012898 kernel: audit: type=1103 audit(1734055975.983:1613): pid=6701 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:56.013041 kernel: audit: type=1006 audit(1734055975.983:1614): pid=6701 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Dec 13 02:12:55.983000 audit[6701]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9ed447f0 a2=3 a3=0 items=0 ppid=1 pid=6701 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:56.028742 kernel: audit: type=1300 audit(1734055975.983:1614): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9ed447f0 a2=3 a3=0 items=0 ppid=1 pid=6701 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:12:55.983000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:12:56.004000 audit[6701]: USER_START pid=6701 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:56.098995 kernel: audit: type=1327 audit(1734055975.983:1614): proctitle=737368643A20636F7265205B707269765D Dec 13 02:12:56.099148 kernel: audit: type=1105 audit(1734055976.004:1615): pid=6701 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:56.099196 kernel: audit: type=1103 audit(1734055976.011:1616): pid=6703 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:56.011000 audit[6703]: CRED_ACQ pid=6703 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:56.322253 systemd[1]: run-containerd-runc-k8s.io-a8cf7a2276a9feca6bba0404a5b324e2a751a16938fc9813f911ee998c45478d-runc.hKhOTw.mount: Deactivated successfully. Dec 13 02:12:56.329453 sshd[6701]: pam_unix(sshd:session): session closed for user core Dec 13 02:12:56.338000 audit[6701]: USER_END pid=6701 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:56.341962 systemd[1]: sshd@24-10.128.0.74:22-139.178.68.195:43622.service: Deactivated successfully. Dec 13 02:12:56.343324 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 02:12:56.347154 systemd-logind[1211]: Session 24 logged out. Waiting for processes to exit. Dec 13 02:12:56.349062 systemd-logind[1211]: Removed session 24. Dec 13 02:12:56.372667 kernel: audit: type=1106 audit(1734055976.338:1617): pid=6701 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:56.338000 audit[6701]: CRED_DISP pid=6701 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:56.399914 kernel: audit: type=1104 audit(1734055976.338:1618): pid=6701 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:12:56.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.128.0.74:22-139.178.68.195:43622 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:12:57.205000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:12:57.205000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0022c8a60 a2=fc6 a3=0 items=0 ppid=1751 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 key=(null) Dec 13 02:12:57.205000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:12:57.206000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:12:57.206000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:12:57.206000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0022c8c20 a2=fc6 a3=0 items=0 ppid=1751 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 key=(null) Dec 13 02:12:57.206000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:12:57.206000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00221e400 a2=fc6 a3=0 items=0 ppid=1751 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 key=(null) Dec 13 02:12:57.206000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:12:57.207000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:12:57.207000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00221e420 a2=fc6 a3=0 items=0 ppid=1751 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c333 key=(null) Dec 13 02:12:57.207000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:13:01.386775 systemd[1]: Started sshd@25-10.128.0.74:22-139.178.68.195:37972.service. Dec 13 02:13:01.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.128.0.74:22-139.178.68.195:37972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:13:01.392480 kernel: kauditd_printk_skb: 13 callbacks suppressed Dec 13 02:13:01.392679 kernel: audit: type=1130 audit(1734055981.386:1624): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.128.0.74:22-139.178.68.195:37972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:13:01.710000 audit[6750]: USER_ACCT pid=6750 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:13:01.712957 sshd[6750]: Accepted publickey for core from 139.178.68.195 port 37972 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:13:01.741665 kernel: audit: type=1101 audit(1734055981.710:1625): pid=6750 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:13:01.741921 kernel: audit: type=1103 audit(1734055981.740:1626): pid=6750 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:13:01.740000 audit[6750]: CRED_ACQ pid=6750 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:13:01.742849 sshd[6750]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:13:01.757651 systemd-logind[1211]: New session 25 of user core. Dec 13 02:13:01.760776 systemd[1]: Started session-25.scope. Dec 13 02:13:01.783604 kernel: audit: type=1006 audit(1734055981.740:1627): pid=6750 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Dec 13 02:13:01.783852 kernel: audit: type=1300 audit(1734055981.740:1627): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd73c0b580 a2=3 a3=0 items=0 ppid=1 pid=6750 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:13:01.740000 audit[6750]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd73c0b580 a2=3 a3=0 items=0 ppid=1 pid=6750 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:13:01.740000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:13:01.812599 kernel: audit: type=1327 audit(1734055981.740:1627): proctitle=737368643A20636F7265205B707269765D Dec 13 02:13:01.821673 kernel: audit: type=1105 audit(1734055981.771:1628): pid=6750 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:13:01.771000 audit[6750]: USER_START pid=6750 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:13:01.771000 audit[6752]: CRED_ACQ pid=6752 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:13:01.854707 kernel: audit: type=1103 audit(1734055981.771:1629): pid=6752 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:13:02.048439 sshd[6750]: pam_unix(sshd:session): session closed for user core Dec 13 02:13:02.050000 audit[6750]: USER_END pid=6750 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:13:02.054857 systemd[1]: sshd@25-10.128.0.74:22-139.178.68.195:37972.service: Deactivated successfully. Dec 13 02:13:02.056129 systemd[1]: session-25.scope: Deactivated successfully. Dec 13 02:13:02.058672 systemd-logind[1211]: Session 25 logged out. Waiting for processes to exit. Dec 13 02:13:02.060642 systemd-logind[1211]: Removed session 25. Dec 13 02:13:02.084925 kernel: audit: type=1106 audit(1734055982.050:1630): pid=6750 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:13:02.050000 audit[6750]: CRED_DISP pid=6750 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:13:02.109597 kernel: audit: type=1104 audit(1734055982.050:1631): pid=6750 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:13:02.050000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.128.0.74:22-139.178.68.195:37972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'